(Last updated 7 Apr 2022)
Also at DBLP, Google Scholar, Heriot-Watt’s Research Gateway, and ORCID.
You can also see my list of past and upcoming presentations.
2022
- “The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection”, EICC 2022.
[paper (coming soon)]
Authors: Tin Tironsakkul, Manuel Maarek, Andrea Eross and Mike Just.
2021
- “A Review of Amplification-based Distributed Denial of Services Attacks and Mitigation”, Computers & Security.
[paper (coming soon)]
Authors: Salih Ismail, Hani Ragab Hassen, Mike Just, Hind Zantout - “Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles”, IFIP SEC 2021.
[paper (coming soon)]
Authors: Filip Wieslaw Bartoszewski, Mike Just, Michael Lones, Oleksii Mandrychenko.
2020
- “Digital security in families: The sources of information relate to the active mediation of internet safety and parental internet skills”, Behaviour and Information Technology.
[paper]
Authors: Lenka Dedkova, David Smahel, Mike Just. - “An Investigation of Comic-Based Permission Requests”, Nordsec 2020.
[paper]
Authors: Katie Watson, Mike Just, Tessa Berg. - “Tracking Mixed Bitcoins”, 4th International Workshop on Cryptocurrencies and Blockchain Technology (CBT) (at ESORICS 2020).
[paper]
Authors: Tin Tironsakkul, Manuel Maarek, Andrea Eross and Mike Just. - “Are autistic children more vulnerable online? Relating autism to online safety, child wellbeing and parental risk management”, NordiCHI 2020.
[paper]
Authors: Kirsty Macmillan, Tessa Berg, Mike Just and Mary Stewart.
2019
- “Probing the mystery of cryptocurrency theft: An investigation into methods for cryptocurrency tainting analysis”, Cryptocurrency Research Conference 2019.
[paper]
Authors: Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just. - “Personal Safety App Effectiveness”, CHI 2019, ACM.
[paper]
Authors: Mike Just, Hasmeet Chandok, Raghav Sampangi, Kirstie Hawkey, Alette Willis, Jeyabalaji Samuthiravelu, Dilpreet Gill, Michael Altair.
2018
- “Hardware-assisted Secure Communication in Embedded and Multi-core Computing Systems”, in Computers, 7(2): Special Issue on Multi-Core Systems-On-Chips Design and Optimization.
[paper]
Authors: Ahmed Saeed, Ali Ahmadinia and Mike Just. - “Experimental large-scale review of attractors for detection of potentially unwanted applications”, in Computers & Security, vol. 76, July 2018.
[paper]
Authors: Vlasta Stavova, Lenka Dedkova, Vashek Matyas, Mike Just, David Smahel, Martin Ukrop
2017
- “Stop Annoying Me! An Empirical Investigation of the Usability of App Privacy Notifications”, OzCHI 2017, ACM.
Authors: Nicholas Micallef, Mike Just, Lynne Baillie, Maher Alharby - “Factors Influencing the Purchase of Security Software for Mobile Devices — Case Study”, in Infocommunications Journal, IEEE.
[paper]
Authors: Vlasta Stavova, Vashek Matyas, and Mike Just. - “Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism”, INTERACT 2017, Springer.
Authors: Mike Just and Tessa Berg. - “Everything’s Cool: Extending Security Warnings with Thermal Feedback”, CHI 2017, ACM.
[paper]
Authors: Graham Wilson, Harry Maxwell, and Mike Just.
2016
- “Codes v. People: A comparative usability study of two password recovery mechanisms”, WISTP 2016.
Authors: Vlasta Stavova, Vashek Matyas, and Mike Just. - “On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications”, in European Workshop on Usable Security (EuroUSEC 2016).
[paper]
Authors: Vlasta Stavova, Vashek Matyas, and Mike Just. - “Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses”, Advances in Software Engineering. (Extended version of CS2 workshop paper below.)
[paper]
Authors: Ahmed Saeed, Ali Ahmadinia and Mike Just. - “Secure On-Chip Communication Architecture for Reconfigurable Multi-core Systems”, Journal of Circuits, Systems, and Computers.
[paper]
Authors: Ahmed Saeed, Ali Ahmadinia and Mike Just - “Investigating time series visualisations to improve the user experience”, ACM CHI 2016.
[paper, presentation]
23.4% acceptance rate (>2300 submissions)
Authors: Muhammad Adnan, Mike Just, Lynne Baillie - “Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses”, Third Workshop on Cryptography and Security in Computing Systems (CS2, co-located with HiPEAC 2016), ACM.
Authors: Ahmed Saeed, Ali Ahmadinia and Mike Just
2015
- Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015, arXiv.org, 22 June 2015. [proceedings]
Editors: Abigail Goldsteen, Tyrone Grandison, Mike Just, Larry Koved, Rohan Malcolm, Sean Thorpe - “Why aren’t users using protection? Investigating the usability of smartphone locking”, MobileHCI 2015, ACM.
[paper: authors’ version, publisher version]
Honorable Mention Award (top 5% of submissions)
Authors: Nicholas Micallef, Mike Just, Lynne Baillie, Martin Halvey, Gunes Kayacik - “Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices”, PerCom 2015, IEEE.
[paper: authors’ version, publisher version]
14.8% acceptance rate (29 out of 196)
Authors: Nicholas Micallef, Gunes Kayacik, Mike Just, Lynne Baillie, David Aspinall - “Investigating the work practices of network security professionals”, in Information and Computer Security (ICS), Emerald, 2015.
[paper: authors’ version, publisher version]
Authors: Muhammad Adnan, Mike Just, Lynne Baillie, Gunes Kayacik
2014
- Proceedings of the Third Workshop on Mobile Security Technologies (MoST), arXiv.org, 24 Oct 2014. [proceedings]
Editors: Larry Koved, Kapil Singh, Hao Chen, and Mike Just - “An ID and Address Protection Unit for NoC based Communication Architectures”, SIN 2014, ACM. [paper: publisher version]
Authors: Ahmed Saeed, Ali Ahmadinia, Mike Just and Christophe Bobda - “Authentication frequency as an important design factor”, WAY Workshop at SOUPS 2014. [paper, slides]
Author: Mike Just - “Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors”, MoST 2014, arXiv.org.
[paper, slides]
Press: BBC News, New Scientist, Daily Mail
Authors: Gunes Kayacik, Mike Just, Lynne Baillie, David Aspinall, Nicholas Micallef
2013
- “‘Stop Questioning Me!’: Towards Optimizing User Involvement during Data Collection on Mobile Devices”, MobileHCI 2013. [paper: authors’ version, publisher version]
Authors: Nicholas Micallef, Mike Just, Lynne Baillie, Gunes Kayacik - “Non-intrusive and transparent authentication on smart phones”, Trust 2013, Springer.
[paper: publisher version]:
Awarded best poster presentation at conference.
Authors: Nicholas Micallef, Mike Just, Lynne Baillie, Gunes Kayacik - “‘Give Me Letters 2, 3 and 6!’: Partial Password Implementations and Attacks”, Financial Cryptography 2013), Springer. [paper: authors’ version, publisher version]:
12.5% (full paper) acceptance (14 out of 112)
Press: New Scientist
Authors: David Aspinall, Mike Just
2012
- “On the Security and Usability of Dual Credential Authentication in UK Online Banking”, ICITST-2012, IEEE. [paper: publisher version]
Authors: Mike Just, David Aspinall - “Trends in Government E-Authentication Policy and Practice,” in K.J. Bwalya & S.F. Zulu (Eds.), E-Government in Emerging Economies – Adoption, Continuance Usage, e-Participation and legal frameworks, IGI Global, 2012. [chapter: publisher version]
Authors: Karen Renaud, Mike Just
2011
- “Using Avatars for Improved Authentication with Challenge Questions”, SECURWARE 2011. [paper: publisher version]
Authors: Nicholas Micallef, Mike Just - “Social Security,” BCS Interfaces, vol. 86, Spring 2011. [paper]
Author: Mike Just
2010
- “Pictures or Questions? Examining User Responses to Association-Based Authentication,” British HCI 2010. [paper: authors’ version]
Authors: Karen Renaud, Mike Just - “Challenging Challenge Questions: An Experimental Analysis of Authentication Technologies and User Behaviour,” Policy and Internet Journal: Vol. 2: Iss. 1, Article 5, 2010. [paper: publisher version]
Authors: Mike Just, David Aspinall - “What’s in a Name? Evaluating Statistical Attacks Against Personal Knowledge Questions,” Financial Cryptography 2010, Springer. [paper: authors’ version, presentation, data]:
14.6% (full paper) acceptance (19 out of 130)
Press: BBC News, New Scientist, The Telegraph
Authors: Joseph Bonneau, Mike Just, Greg Matthews
2009 and earlier
- Mike Just, David Aspinall, “Personal Choice and Challenge Questions: A Security and Usability Assessment,” in Proceedings of the 5th ACM Symposium on Usable Privacy and Security (SOUPS) 2009.
[paper, presentation, experiment info]
Press: ZDNet - Mike Just, “Designing and Evaluating Challenge-Question Systems”, in IEEE Security & Privacy, 2(5): 32-39 (2004) [paper]
- Mike Just, Evangelos Kranakis, Tao Wan, “Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks”, ADHOC-NOW 2003, 151-163 [paper]
- Mike Just, Paul C. van Oorschot, “Addressing the Problem of Undetected Signature Key Compromise”, NDSS 1999.
[paper]: 24% acceptance - Mike Just, “Some Timestamping Protocol Failures”, NDSS 1998
[paper]: 33.3% acceptance (15 out of 45) - Mike Just, Serge Vaudenay, “Authenticated Multi-Party Key Agreement”, ASIACRYPT 1996, 36-49
[paper]: 25% acceptance (31 out of 124) - Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot, “On Key Distribution via True Broadcasting”, ACM Conference on Computer and Communications Security 1994, 81-88
[paper]