Scott Ruoti (@scottruoti) 's Twitter Profile
Scott Ruoti

@scottruoti

Assistant professor @EECS_UTK. Researching computer security and human factors. Follower of Jesus Christ and a member of His restored church (@Ch_JesusChrist).

ID: 1032807643067441154

linkhttp://userlab.utk.edu/scott-ruoti calendar_today24-08-2018 01:51:45

91 Tweet

105 Followers

85 Following

Scott Ruoti (@scottruoti) 's Twitter Profile Photo

Great article on why MFA is not a panacea: linkedin.com/pulse/why-majo…. MFA is great, but it can often still be phished. Better than just a password, but far from perfect.

Scott Ruoti (@scottruoti) 's Twitter Profile Photo

We have two openings in computer science at the University of Tennessee. We are looking for a range of areas, but of course, I'm most interested in the fact that we are looking for people doing cybersecurity. If you are interested, feel free to reach out! cra.org/job/university…

ACSAC (@acsac_conf) 's Twitter Profile Photo

Next up in our #ACSAC2021 #paper #previews is Oesch et al.'s investigation of whether autofill is secure on mobile devices. Their paper explores this question, identifying both strengths and critical vulnerabilities for mobile autofill frameworks! Scott Ruoti Sean Oesch Anuj Gautam

ACSAC (@acsac_conf) 's Twitter Profile Photo

If you are interested in researching password managers, this #ACSAC2021 #paper #preview is just the paper to get you started. In it, Simmons et al. systematize use cases as well as design paradigms and identify open research needs. Scott Ruoti Sean Oesch

ACSAC (@acsac_conf) 's Twitter Profile Photo

Today's #ACSAC2021 #paper #preview looks at Wu et al.’s "Security and Privacy Vulnerability Analysis of Qi Wireless Charging" reveals critical vulnerabilities of Qi wireless charging through the nearby hidden adversarial coil. Jian (Jack) Liu EECS Tickle College of Engineering UT Knoxville

Today's #ACSAC2021 #paper #preview looks at Wu et al.’s "Security and Privacy Vulnerability Analysis of Qi Wireless Charging" reveals critical vulnerabilities of Qi wireless charging through the nearby hidden adversarial coil. <a href="/jianliufly/">Jian (Jack) Liu</a> <a href="/EECS_UTK/">EECS</a> <a href="/UTK_TCE/">Tickle College of Engineering</a> <a href="/UTKnoxville/">UT Knoxville</a>
Horst Goertz Institute for IT Security (@hgi_bochum) 's Twitter Profile Photo

📢Note the date for the next #CASADistinguishedLecture with Scott Ruoti 👉December 16, 2021, 4:00 pm (UTC +1) 👉Topic: Johnny’s Journey Toward Usable Secure E-mail” 👉Free access –Get link & abstract here: casa.rub.de/en/news/distin…

Scott Ruoti (@scottruoti) 's Twitter Profile Photo

Little disappointed. There are only six attendees in the ACSAC session for our group's presentation of our work on systematizing password manager use cases. If that sounds interesting to you, check out the video and our work at userlab.utk.edu/publications/s….

USENIX Security (@usenixsecurity) 's Twitter Profile Photo

The Call for Papers for the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022) is now available! The symposium will take place will take place August 7–9 in Boston, MA. Details: bit.ly/soups2022cfp Symposium on Usable Privacy and Security

The Call for Papers for the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022) is now available! The symposium will take place will take place August 7–9 in Boston, MA. Details: bit.ly/soups2022cfp <a href="/SOUPSConference/">Symposium on Usable Privacy and Security</a>
Russell M. Nelson (@nelsonrussellm) 's Twitter Profile Photo

The first gift of Christmas was neither gold, nor frankincense, nor myrrh. It was the gift from a loving God of His Only Begotten Son.

The first gift of Christmas was neither gold, nor frankincense, nor myrrh. It was the gift from a loving God of His Only Begotten Son.
Scott Ruoti (@scottruoti) 's Twitter Profile Photo

I'm excited to announce that our paper (Sean Oesch, Anuj Gautam) examining password manager usage in the wild will appear at CHI '22. Our results shed light on how, and more importantly why people use password managers as they do. Preprint here: userlab.utk.edu/publications/o…

Association for Computing Machinery (@theofficialacm) 's Twitter Profile Photo

Congratulations to Jack Dongarra, who receives 2021 #ACMTuringAward for pioneering contributions to numerical algorithms and libraries that enabled high performance computational software to keep pace with exponential hardware improvements for decades." bit.ly/381HBiV

Congratulations to Jack Dongarra, who receives 2021 #ACMTuringAward for pioneering contributions to numerical algorithms and libraries that enabled high performance computational software to keep pace with exponential hardware improvements for decades." bit.ly/381HBiV
Alex Williams (@acwio) 's Twitter Profile Photo

My department wrote a press release about Senjuti Dutta's forthcoming #CHI2022 paper on mobilizing crowdwork through design. (cc: Rhema Linder, PhD, Anastasia Kuzminykh) PS: Paper available soon! #ProudAdvisor eecs.utk.edu/doctoral-stude…

Joe Calandrino (@inplaintext) 's Twitter Profile Photo

📢 Job announcement: FTC OTech is hiring for a computer scientist position! OTech provides tech expertise and conducts publishable research to inform and advance the FTC's mission.

Scott Ruoti (@scottruoti) 's Twitter Profile Photo

Great talk about the semi-broken review process in security venues: computer.org/csdl/proceedin…. Even in my limited time in the community, I think we have improved significantly. I think the future is bright for security venues. IEEE S&P #SP22

Jeremy Clark (@pulpspy) 's Twitter Profile Photo

Podcast (Futurati w/ Trent Fowler and Thomas Frey CSP) episode with me introducing L2s, cryptographic voting, and other topics: youtu.be/Rk-hOQI0C5c Also check out the episode before with Scott Ruoti: youtu.be/2z3g-ZCaWF0

Russell M. Nelson (@nelsonrussellm) 's Twitter Profile Photo

Because Jesus Christ overcame this fallen world and because He atoned for each of us, you too can overcome this sin-saturated, self-centered, and often exhausting world. #GeneralConference

Scott Ruoti (@scottruoti) 's Twitter Profile Photo

apply.interfolio.com/132950 The University of Tennessee is hiring in the area of cybersecurity. I would love to have a colleague in the area of usable security. Feel free to reach out to me with any questions.

Scott Ruoti (@scottruoti) 's Twitter Profile Photo

The University of Tennessee, Knoxville is looking to hire a faculty member in the areas of software engineering, software systems, or programming languages. If you know any students nearing graduation in these areas, please share this opportunity with them apply.interfolio.com/152654

Scott Ruoti (@scottruoti) 's Twitter Profile Photo

The University of Tennessee, Knoxville is looking to hire a faculty member in the area of cyber-physical systems. If you or anyone you know would be interested, have them apply. It says grid security, but any CPS candidate will receive equal consideration. apply.interfolio.com/153122