Publications

* Indicates equal co-authorship

2026

Signals of Provenance: Practices & Challenges of Navigating Indicators in AI-Generated Media for Sighted and Blind Individuals

Ayae Ide, Tory Park, Jaron Mink, Tanusree Sharma

ACM Conference on Computer-Supported Cooperative Work and Social Computing, 2026

I Can SE Clearly Now: Investigating the Effectiveness of GUI-based Symbolic Execution for Software Vulnerability Discovery

Yi Jou Li, Zeming Yu, James A Mattei, Ananta Soneji, Zhibo Sun, Ruoyu Wang, Jaron Mink, Daniel Votipka, Tiffany Bao

ACM CHI Conference on Human Factors in Computing Systems, 2026

Do Hackers Dream of Electric Teachers?: A Large-Scale, In-Situ Evaluation of Cybersecurity Student Behaviors and Performance with AI Tutors

Michael Tompkins, Nihaarika Agarwal, Ananta Soneji, Robert Wasinger, Connor Nelson, Kevin Leach, Rakibul Hasan, Adam Doupé, Daniel Votipka, Yan Shoshitaishvili, Jaron Mink

Pre-Print, 2026

"Unlimited Realm of Exploration and Experimentation": Methods and Motivations of AI-Generated Sexual Content Creators

Jaron Mink*, Lucy Qin*, Elissa M. Redmiles

Pre-Print, 2026

2024

SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors

Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner

33rd USENIX Security Symposium, 2024

It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias

Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang

ACM CHI Conference on Human Factors in Computing Systems, 2024

News: NIST AI Executive Order RFI

2023

"Security is not my field, I'm a stats guy": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry

Jaron Mink*, Harjot Kaur*, Juliane Schmüser*, Sascha Fahl, Yasemin Acar

32nd USENIX Security Symposium, 2023

News: Human-Centered Security Podcast, NIST AI Executive Order RFI

SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions

Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan

44th IEEE Symposium on Security and Privacy, 2023

Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations

Jaron Mink, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang

44th IEEE Symposium on Security and Privacy, 2023

News: Human-Centered Security Podcast, NIST AI Executive Order RFI

2022

FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput

Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan

38th Annual Computer Security Applications Conference, 2022

DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks

Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueria, Yang Wang, Gang Wang

31st USENIX Security Symposium, 2022

News: Futurum, New Scientist, NIST AI Executive Order RFI

Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking App

Jaron Mink, Amanda Rose Yuile, Uma Pal, Adam J Aviv, Adam Bates

ACM CHI Conference on Human Factors in Computing Systems, 2022

News: The 21st Show

Beyond Bot Detection: Combating Fraudulent Online Survey Takers

Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang

The ACM Web Conference, 2022

News: The Transmitter

2020

On the Forensic Validity of Approximated Audit Logs

Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates

36th Annual Computer Security Applications Conference, 2020