Tamara Denning

Assistant Professor
School of Computing
University of Utah

Twitter: @tamaradenning

How Old Are You?: Towards Identifying Measurable Cognitive Phenomena for Online Age Verification
Ahmad Alsaleem, Roger Altizer, Tamara Denning
Who are you? Adventures in Authentication (WAY) Workshop 2018, Co-located with SOUPS 2018, Co-located with USENIX Security 2018

IDE Plugins for Detecting Input-Validation Vulnerabilities
Aniqua Z. Baset and Tamara Denning
Fourth Workshop on Language-Theoretic Security (LangSec), 2017 (IEEE S&P Symposium 2017 Workshop)

Lessons from Deploying a Diagnostic Game with Children in a Clinical Setting
Ahmad Alsaleem, Tamara Denning, and Roger Altizer
Workshop on Interactive Systems in Healthcare (WISH), 2017 (CHI 2017 Workshop)

Keeping Ahead of Our Adversaries
Jane Cleland-Huang, Tamara Denning, Tadayoshi Kohno, Forrest Shull, and Samuel Weber
IEEE Software 33(3), 2016

Augmented Reality: A Technology & Policy Primer
Ryan Calo, Tamara Denning, Batya Friedman, Tadayoshi Kohno, Lassana Magassa, Emily McReynolds, Bryce Clayton Newell, Franziska Roesner, and Jesse Woo
Tech Policy Lab, University of Washington, 2015

Evaluating Cybersecurity Education Interventions: Three Case Studies
Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, and Tamara Denning
IEEE Security & Privacy 13(3), 2015

CPS: Beyond Usability: Applying Value Sensitive Design Based Methods to Investigate Domain Characteristics for Security for Implantable Cardiac Devices
Tamara Denning, Batya Friedman, Brian Gill, Daniel B. Kramer, Matthew R. Reynolds, and Tadayoshi Kohno
Annual Computer Security Applications Conference (ACSAC), 2014

Supplementary materials: slides

Augmented Reality: Hard Problems of Law and Policy
Franziska Roesner, Tamara Denning, Bryce Clayton Newell, Tadayoshi Kohno, and Ryan Calo
Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE), 2014 (UbiComp 2014 Workshop)

Practical Lessons From Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research
Tamara Denning, Adam Shostack, Tadayoshi Kohno
USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE '14), 2014 (USENIX Security 2014 Workshop)

Supplementary materials: slides

In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-Mediating Technologies
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno
32nd International Conference on Human Factors in Computing Systems (CHI '14), 2014

Supplementary materials: slides, video preview

Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education
Tamara Denning, Adam Lerner, Adam Shostack, and Tadayoshi Kohno
ACM Conference on Computer and Communications Security (CCS '13), 2013

Supplementary materials: slides

Security Through Play
Mark Gondree, Zachary N.J. Peterson, and Tamara Denning
IEEE Security & Privacy 11(3), 2013

Computer Security and the Modern Home
Tamara Denning, Tadayoshi Kohno, Henry M. Levy
Communications of the ACM 56(1), 2013

Control-Alt-Hack™: A Card Game for Computer Security Outreach, Education, and Fun
Tamara Denning, Tadayoshi Kohno, and Adam Shostack
University of Washington Computer Science and Engineering Technical Report, UW-CSE-12-07-01, 2012

Exploring Implicit Memory for Painless Password Recovery
Tamara Denning, Kevin Bowers, Marten van Dijk, and Ari Juels
29th Conference on Human Factors in Computing Systems (CHI '11), 2011

Supplementary materials: slides

Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices
Tamara Denning, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno, and William H. Maisel
28th International Conference on Human Factors in Computing Systems (CHI '10), 2010

Supplementary materials: slides

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons
Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R. Smith, and Tadayoshi Kohno
11th International Conference on Ubiquitous Computing (UbiComp '09), 2009

Supplementary materials: FAQ, slides, video

Neurosecurity: Security and Privacy for Neural Devices
Tamara Denning, Yoky Matsuoka, and Tadayoshi Kohno
Neurosurgical Focus 27(1), 2009

BALANCE: Towards a Usable Pervasive Wellness Application with Accurate Activity Inference
Tamara Denning, Adrienne Andrew, Rohit Chaudhri, Carl Hartung, Jonathan Lester, Gaetano Borriello, and Glen Duncan
Tenth International Workshop on Mobile Computing Systems and Applications (HotMobile '09), 2009

Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security
3rd USENIX Workshop on Hot Topics in Security (HotSec '08), 2008

Supplementary materials: slides

Exploring the Potential of Mobile Phones for Active Learning in the Classroom
David Lindquist, Tamara Denning, Michael Kelly, Roshni Malani, William G. Griswold, and Beth Simon
Special Interest Group on Computer Science Education Technical Symposium (SIGCSE '07), 2007

Lightweight Preliminary Peer Review: Does in-class peer review make sense?
Tamara Denning, Michael Kelly, David Lindquist, Roshni Malani, William G. Griswold, and Beth Simon
Special Interest Group on Computer Science Education Technical Symposium (SIGCSE '07), 2007

Multimodal Communication in the Classroom: What Does It Mean For Us?
Tamara Denning, William Griswold, Beth Simon and Michelle Wilkerson
Special Interest Group on Computer Science Education Technical Symposium (SIGCSE '06), 2006