{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:16Z","timestamp":1750221076083,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243746","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1256-1271","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards Usable Checksums"],"prefix":"10.1145","author":[{"given":"Mauro","family":"Cherubini","sequence":"first","affiliation":[{"name":"UNIL-HEC Lausanne, Lausanne, Switzerland"}]},{"given":"Alexandre","family":"Meylan","sequence":"additional","affiliation":[{"name":"UNIL-HEC Lausanne, Lausanne, Switzerland"}]},{"given":"Bertil","family":"Chapuis","sequence":"additional","affiliation":[{"name":"UNIL-HEC Lausanne, Lausanne, Switzerland"}]},{"given":"Mathias","family":"Humbert","sequence":"additional","affiliation":[{"name":"Swiss Data Science Center, Lausanne, Switzerland"}]},{"given":"Igor","family":"Bilogrevic","sequence":"additional","affiliation":[{"name":"Google Inc., Zurich, Switzerland"}]},{"given":"K\u00e9vin","family":"Huguenin","sequence":"additional","affiliation":[{"name":"UNIL-HEC Lausanne, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"volume-title":"Obstacles to the Adoption of Secure Communication Tools Proc. of the IEEE Symp. on Security and Privacy (S&P)","author":"Abu-Salma Ruba","key":"e_1_3_2_2_1_1","unstructured":"Ruba Abu-Salma , M. Angela Sasse , Joseph Bonneau , Anastasia Danilova , Alena Naiakshina , and Matthew Smith . 2017. Obstacles to the Adoption of Secure Communication Tools Proc. of the IEEE Symp. on Security and Privacy (S&P) . IEEE , 137--153. Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, and Matthew Smith. 2017. Obstacles to the Adoption of Secure Communication Tools Proc. of the IEEE Symp. on Security and Privacy (S&P). IEEE, 137--153."},{"key":"e_1_3_2_2_2_1","volume-title":"Proc. of the USENIX Security Symp. (USENIX Security)","volume":"13","author":"Akhawe Devdatta","year":"2013","unstructured":"Devdatta Akhawe and Adrienne Porter Felt . 2013 . Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness . In Proc. of the USENIX Security Symp. (USENIX Security) , Vol. Vol. 13 . USENIX. Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In Proc. of the USENIX Security Symp. (USENIX Security), Vol. Vol. 13. USENIX."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702322"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017481"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455841"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488406"},{"key":"e_1_3_2_2_9_1","volume-title":"A Refined Experience Sampling Method to Capture Mobile User Experience. arXiv:0906.4125 {cs} (June","author":"Cherubini Mauro","year":"2009","unstructured":"Mauro Cherubini and Nuria Oliver . 2009. A Refined Experience Sampling Method to Capture Mobile User Experience. arXiv:0906.4125 {cs} (June . 2009 ). {arxiv}cs\/0906.4125 Mauro Cherubini and Nuria Oliver. 2009. A Refined Experience Sampling Method to Capture Mobile User Experience. arXiv:0906.4125 {cs} (June. 2009). {arxiv}cs\/0906.4125"},{"key":"e_1_3_2_2_10_1","unstructured":"Information Technology Laboratory Computer Security Division. {n. d.}. NIST Policy on Hash Functions - Hash Functions | CSRC. https:\/\/csrc.nist.gov\/projects\/hash-functions\/nist-policy-on-hash-functions.  Information Technology Laboratory Computer Security Division. {n. d.}. NIST Policy on Hash Functions - Hash Functions | CSRC. https:\/\/csrc.nist.gov\/projects\/hash-functions\/nist-policy-on-hash-functions."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858265"},{"volume-title":"The Importance of Being Earnest {in Security Warnings} Proc. of the Int'l Conf. on Financial Cryptography and Data Security (FC)","author":"Egelman Serge","key":"e_1_3_2_2_13_1","unstructured":"Serge Egelman and Stuart Schechter . 2013. The Importance of Being Earnest {in Security Warnings} Proc. of the Int'l Conf. on Financial Cryptography and Data Security (FC) . Springer , 52--59. Serge Egelman and Stuart Schechter. 2013. The Importance of Being Earnest {in Security Warnings} Proc. of the Int'l Conf. on Financial Cryptography and Data Security (FC). Springer, 52--59."},{"key":"e_1_3_2_2_14_1","volume-title":"Proc. of the Symp. on Usable Privacy and Security (SOUPS). ACM.","author":"Vaziripour Elham","year":"2017","unstructured":"Elham Vaziripour , Justin Wu , Mark O'Neill , Ray Clinton , Jordan Whitehead , Scott Heidbrink , Kent Seamons , and Daniel Zappala . 2017 . Is That You, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications . In Proc. of the Symp. on Usable Privacy and Security (SOUPS). ACM. Elham Vaziripour, Justin Wu, Mark O'Neill, Ray Clinton, Jordan Whitehead, Scott Heidbrink, Kent Seamons, and Daniel Zappala. 2017. Is That You, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications. In Proc. of the Symp. on Usable Privacy and Security (SOUPS). ACM."},{"key":"e_1_3_2_2_15_1","volume-title":"Proc. of the Symp. on Usable Privacy and Security (SOUPS). ACM, 59--75","author":"Fagan Michael","year":"2016","unstructured":"Michael Fagan and Mohammad Maifi Hasan Khan . 2016 . Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice . In Proc. of the Symp. on Usable Privacy and Security (SOUPS). ACM, 59--75 . Michael Fagan and Mohammad Maifi Hasan Khan. 2016. Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice. In Proc. of the Symp. on Usable Privacy and Security (SOUPS). ACM, 59--75."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"R. Fielding and J. Reschke. 2014. Hypertext Transfer Protocol (HTTP\/1.1): Semantics and Content. RFC 7231. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc7231.txt.  R. Fielding and J. Reschke. 2014. Hypertext Transfer Protocol (HTTP\/1.1): Semantics and Content. RFC 7231. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc7231.txt.","DOI":"10.17487\/rfc7231"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.03.001"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/507072.507082"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.20"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0644"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(76)90015-3"},{"key":"e_1_3_2_2_24_1","unstructured":"Swati Khandelwal. 2018. Flaw in Popular Transmission BitTorrent Client Lets Hackers Control Your PC Remotely. https:\/\/thehackernews.com\/2018\/01\/bittorent-transmission-hacking.html.  Swati Khandelwal. 2018. Flaw in Popular Transmission BitTorrent Client Lets Hackers Control Your PC Remotely. https:\/\/thehackernews.com\/2018\/01\/bittorent-transmission-hacking.html."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.09.014"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3230"},{"volume-title":"Encyclopedia of Human Computer Interaction. 13.","author":"Poole Alex","key":"e_1_3_2_2_27_1","unstructured":"Alex Poole and Linden J Ball . 2006. Eye Tracking in Human-Computer Interaction and Usability Research: Current Status and Future Prospects . In Encyclopedia of Human Computer Interaction. 13. Alex Poole and Linden J Ball. 2006. Eye Tracking in Human-Computer Interaction and Usability Research: Current Status and Future Prospects. In Encyclopedia of Human Computer Interaction. 13."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050406"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025673"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_3_2_2_32_1","volume-title":"Cyber Security Breaches Survey","author":"Rishi Vaidya","year":"2018","unstructured":"Vaidya Rishi . 2018. Cyber Security Breaches Survey 2018 . Survey. United Kingdom . Vaidya Rishi. 2018. Cyber Security Breaches Survey 2018. Survey. United Kingdom."},{"volume-title":"Second-Preimage Resistance, and Collision Resistance Proc. of Int'l Workshop on Fast Software Encryption (FSE) (Lecture Notes in Computer Science)","author":"Rogaway Phillip","key":"e_1_3_2_2_33_1","unstructured":"Phillip Rogaway and Thomas Shrimpton . 2004. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance , Second-Preimage Resistance, and Collision Resistance Proc. of Int'l Workshop on Fast Software Encryption (FSE) (Lecture Notes in Computer Science) . Springer , 371--388. Phillip Rogaway and Thomas Shrimpton. 2004. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance Proc. of Int'l Workshop on Fast Software Encryption (FSE) (Lecture Notes in Computer Science). Springer, 371--388."},{"key":"e_1_3_2_2_34_1","volume-title":"An Empirical Study of Textual Key-Fingerprint Representations Proc. of the USENIX Security Symp. (USENIX Security). USENIX.","author":"Dechand Sergej","year":"2016","unstructured":"Sergej Dechand , Dominik Sch\u00fcrmann , Karoline Busse , Yasemin Acar , Sascha Fahl , and Matthew Smith . 2016 . An Empirical Study of Textual Key-Fingerprint Representations Proc. of the USENIX Security Symp. (USENIX Security). USENIX. Sergej Dechand, Dominik Sch\u00fcrmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. 2016. An Empirical Study of Textual Key-Fingerprint Representations Proc. of the USENIX Security Symp. (USENIX Security). USENIX."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Mario Silic and Andrea Back. 2017. Deterrent Effects of Warnings on User's Behavior in Preventing Malicious Software Use. Vol. Proceedings of the 50th Hawaii International Conference on System Sciences (2017).  Mario Silic and Andrea Back. 2017. Deterrent Effects of Warnings on User's Behavior in Preventing Malicious Software Use. Vol. Proceedings of the 50th Hawaii International Conference on System Sciences (2017).","DOI":"10.24251\/HICSS.2017.600"},{"key":"e_1_3_2_2_36_1","volume-title":"Proc. of the IFIP Workshop on Information Systems Security Research. IFIP.","author":"Silic Mario","year":"2015","unstructured":"Mario Silic , Jordan Barlow , and Dustin Ormond . 2015 . Warning! A Comprehensive Model of the Effects of Digital Information Security Warning Messages . In Proc. of the IFIP Workshop on Information Systems Security Research. IFIP. Mario Silic, Jordan Barlow, and Dustin Ormond. 2015. Warning! A Comprehensive Model of the Effects of Digital Information Security Warning Messages. In Proc. of the IFIP Workshop on Information Systems Security Research. IFIP."},{"key":"e_1_3_2_2_37_1","volume-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness Proc. of the USENIX Security Symp. (USENIX Security). USENIX, 399--416","author":"Sunshine Joshua","year":"2009","unstructured":"Joshua Sunshine , Serge Egelman , Hazim Almuhimedi , Neha Atri , and Lorrie Faith Cranor . 2009 . Crying Wolf: An Empirical Study of SSL Warning Effectiveness Proc. of the USENIX Security Symp. (USENIX Security). USENIX, 399--416 . Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness Proc. of the USENIX Security Symp. (USENIX Security). USENIX, 399--416."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290903121386"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"},{"key":"e_1_3_2_2_40_1","unstructured":"Karen Turner. 2016-07--15T05:07--500. Developers Consider Apple's App Store Restrictive and Anticompetitive Report Shows. Washington Post (2016-07--15T05:07--500).  Karen Turner. 2016-07--15T05:07--500. Developers Consider Apple's App Store Restrictive and Anticompetitive Report Shows. Washington Post (2016-07--15T05:07--500)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci1904_9"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1981-5_5"},{"key":"e_1_3_2_2_44_1","unstructured":"W3C. 2016. Subresource Integrity. https:\/\/www.w3.org\/TR\/SRI\/.  W3C. 2016. Subresource Integrity. https:\/\/www.w3.org\/TR\/SRI\/."},{"key":"e_1_3_2_2_45_1","unstructured":"Christina Warren. {n. d.}. Popular BitTorrent Client Transmission Gets Infected With Malware Again. https:\/\/gizmodo.com\/mac-bittorrent-client-transmission-gets-infected-with-m-1785957214.  Christina Warren. {n. d.}. Popular BitTorrent Client Transmission Gets Infected With Malware Again. https:\/\/gizmodo.com\/mac-bittorrent-client-transmission-gets-infected-with-m-1785957214."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.008"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243746","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:32Z","timestamp":1750208252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243746"}},"subtitle":["Automating the Integrity Verification of Web Downloads for the Masses"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":45,"alternative-id":["10.1145\/3243734.3243746","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243746","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}