var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2F7zSoG2FRMMxwC6p9j&jsonp=1&noBootstrap=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2F7zSoG2FRMMxwC6p9j&jsonp=1&noBootstrap=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2F7zSoG2FRMMxwC6p9j&jsonp=1&noBootstrap=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2026\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n International Students and Scams: At Risk Abroad.\n \n \n \n\n\n \n Zhang, K.; Arunasalam, A.; Datta, P.; and Celik, Z B.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy, 2026. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{zhang2026international,\n  title={International Students and Scams: At Risk Abroad},\n  author={Zhang, Katherine and Arunasalam, Arjun and Datta, Pubali and Celik, Z Berkay},\n  booktitle={IEEE Symposium on Security and Privacy},\n  year={2026}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Investigating the Impact of Dark Patterns on LLM-Based Web Agents.\n \n \n \n\n\n \n Ersoy, D.; Lee, B.; Shreekumar, A.; Arunasalam, A.; Ibrahim, M.; Bianchi, A.; and Celik, Z B.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy, 2026. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ersoy2026investigating,\n  title={Investigating the Impact of Dark Patterns on LLM-Based Web Agents},\n  author={Ersoy, Devin and Lee, Brandon and Shreekumar, Ananth and Arunasalam, Arjun and Ibrahim, Muhammad and Bianchi, Antonio and Celik, Z Berkay},\n  booktitle={IEEE Symposium on Security and Privacy},\n  year={2026}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2025\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Deceptive Sound Therapy on Online Platforms: Do Mental Wellbeing Tracks Conform to User Expectations?.\n \n \n \n\n\n \n Arunasalam, A.; Tong, J.; Farrukh, H.; Ozmen, M. O.; Saha, K.; and Berkay, C. Z.\n\n\n \n\n\n\n In International AAAI Conference on Web and Social Media (ICWSM), 2025. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{arunasalam2025deceptive,\n  title={Deceptive Sound Therapy on Online Platforms: Do Mental Wellbeing Tracks Conform to User Expectations?},\n  author={Arunasalam, Arjun and Tong, Jason and Farrukh, Habiba and Ozmen, Muslum Ozgur and Saha, Koustuv and Berkay, Celik Z.},\n  booktitle={International AAAI Conference on Web and Social Media (ICWSM)},\n  year={2025}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Shadowed Realities: An Investigation of UI Attacks in WebXR.\n \n \n \n\n\n \n Mukherjee, C.; Mohamed, R.; Arunasalam, A.; Farrukh, H.; and Celik, Z. B.\n\n\n \n\n\n\n In USENIX Security Symposium, 2025. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mukherjee2025shadowed,\n  title={Shadowed Realities: An Investigation of UI Attacks in WebXR},\n  author={Mukherjee, Chandrika and Mohamed, Reham and Arunasalam, Arjun and Farrukh, Habiba and Celik, Z. Berkay},\n  booktitle={USENIX Security Symposium},\n  year={2025}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Rethinking how to evaluate language model jailbreak.\n \n \n \n\n\n \n Cai, H.; Arunasalam, A.; Lin, L. Y; Bianchi, A.; and Celik, Z. B.\n\n\n \n\n\n\n In ACM Workshop on Artificial Intelligence and Security, 2025. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{cai2025rethinking,\n  title={Rethinking how to evaluate language model jailbreak},\n  author={Cai, Hongyu and Arunasalam, Arjun and Lin, Leo Y and Bianchi, Antonio and Celik, Z. Berkay},\n  booktitle={ACM Workshop on Artificial Intelligence and Security},\n  year={2025}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Frontline Responders: Rethinking Indicators of Compromise for Industrial Control System Security.\n \n \n \n\n\n \n Asiri, M.; Arunasalam, A.; Saxena, N.; and Celik, Z. B.\n\n\n \n\n\n\n Computers & Security. 2025.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{asiri2025frontline,\n  title={Frontline Responders: Rethinking Indicators of Compromise for Industrial Control System Security},\n  author={Asiri, Mohammed and Arunasalam, Arjun and Saxena, Neetesh and Celik, Z. Berkay},\n  journal={Computers \\& Security},\n  year={2025},\n  publisher={Elsevier}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Characterizing E-Commerce Harm by Investigating Online Communities: A Case Study With Abusive Dropshipping.\n \n \n \n\n\n \n Arunasalam, A.; and Celik, Z. B.\n\n\n \n\n\n\n IEEE Security & Privacy Magazine. 2025.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{arunasalam2025characterizing,\n  title={Characterizing E-Commerce Harm by Investigating Online Communities: A Case Study With Abusive Dropshipping},\n  author={Arunasalam, Arjun and Celik, Z. Berkay},\n  journal={IEEE Security \\& Privacy Magazine},\n  year={2025},\n  publisher={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards Secure User Interaction in WebXR.\n \n \n \n\n\n \n Mukherjee, C.; Arunasalam, A.; Farrukh, H.; Mohamed, R.; and Celik, Z. B.\n\n\n \n\n\n\n In International Workshop on Human-Centered Sensing, Modeling, and Intelligent Systems, 2025. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mukherjee2025towards,\n  title={Towards Secure User Interaction in WebXR},\n  author={Mukherjee, Chandrika and Arunasalam, Arjun and Farrukh, Habiba and Mohamed, Reham and Celik, Z. Berkay},\n  booktitle={International Workshop on Human-Centered Sensing, Modeling, and Intelligent Systems},\n  year={2025}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Understanding Users' Security and Privacy Concerns and Attitudes Towards Conversational AI Platforms.\n \n \n \n\n\n \n Ali, M.; Arunasalam, A.; and Farrukh, H.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy, 2025. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ali2025understanding,\n  title={Understanding Users' Security and Privacy Concerns and Attitudes Towards Conversational AI Platforms},\n  author={Ali, Mutahar and Arunasalam, Arjun and Farrukh, Habiba},\n  booktitle={IEEE Symposium on Security and Privacy},\n  year={2025}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n UI Based Attacks in WebXR.\n \n \n \n\n\n \n Mukherjee, C.; Aburas, R. M.; Arunasalam, A.; Farrukh, H.; and Celik, Z. B.\n\n\n \n\n\n\n In Annual International Conference on Mobile Systems, Applications and Services, 2025. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mukherjee2025ui,\n  title={UI Based Attacks in WebXR},\n  author={Mukherjee, Chandrika and Aburas, Reham Mohamed and Arunasalam, Arjun and Farrukh, Habiba and Celik, Z. Berkay},\n  booktitle={Annual International Conference on Mobile Systems, Applications and Services},\n  year={2025}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Implicit Values Embedded in How Humans and LLMs Complete Subjective Everyday Tasks.\n \n \n \n\n\n \n Arunasalam, A.; Pickering, M.; Celik, Z. B.; and Ur, B.\n\n\n \n\n\n\n In Findings Conference on Empirical Methods in Natural Language Processing (Main Findings, EMNLP), 2025. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{arunasalam2025implicit,\n  title={Implicit Values Embedded in How Humans and LLMs Complete Subjective Everyday Tasks},\n  author={Arunasalam, Arjun and Pickering, Madison and Celik, Z. Berkay and Ur, Blase},\n  booktitle={Findings Conference on Empirical Methods in Natural Language Processing (Main Findings, EMNLP)},\n  year={2025}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2024\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n ATTention Please! An Investigation of the App Tracking Transparency Permission.\n \n \n \n\n\n \n Mohamed, R.; Arunasalam, A.; Farrukh, H.; Tong, J.; Bianchi, A.; and Celik, Z. B.\n\n\n \n\n\n\n In USENIX Security Symposium, 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mohamed2024attention,\n  title={ATTention Please! An Investigation of the App Tracking Transparency Permission},\n  author={Mohamed, Reham and Arunasalam, Arjun and Farrukh, Habiba and Tong, Jason and Bianchi, Antonio and Celik, Z. Berkay},\n  booktitle={USENIX Security Symposium},\n  year={2024}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Understanding the Security and Privacy Implications of Online Toxic Content on Refugees.\n \n \n \n\n\n \n Arunasalam, A.; Farrukh, H.; Tekcan, E.; and Celik, Z. B.\n\n\n \n\n\n\n In USENIX Security Symposium, 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{arunasalam2024understanding,\n  title={Understanding the Security and Privacy Implications of Online Toxic Content on Refugees},\n  author={Arunasalam, Arjun and Farrukh, Habiba and Tekcan, Eliz and Celik, Z. Berkay},\n  booktitle={USENIX Security Symposium},\n  year={2024}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model.\n \n \n \n\n\n \n Arunasalam, A.; Chu, A.; Ozmen, M. O.; Farrukh, H.; and Celik, Z. B.\n\n\n \n\n\n\n In Network and Distributed System Security Symposium (NDSS), 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{arunasalam2024dark,\n  title={The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model},\n  author={Arunasalam, Arjun and Chu, Andrew and Ozmen, Muslum Ozgur and Farrukh, Habiba and Celik, Z. Berkay},\n  booktitle={Network and Distributed System Security Symposium (NDSS)},\n  year={2024}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Exploration of Online Toxic Content Against Refugees.\n \n \n \n\n\n \n Arunasalam, A.; Farrukh, H.; Tekcan, E.; and Celik, Z. B.\n\n\n \n\n\n\n In Symposium on Usable Security and Privacy (USEC), 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{arunasalam2024exploration,\n  title={An Exploration of Online Toxic Content Against Refugees},\n  author={Arunasalam, Arjun and Farrukh, Habiba and Tekcan, Eliz and Celik, Z. Berkay},\n  booktitle={Symposium on Usable Security and Privacy (USEC)},\n  year={2024}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Expectation Conformance in Online Sound Therapy: Designing Tools for Users of Mental Wellbeing Applications.\n \n \n \n\n\n \n Arunasalam, A.; Tong, J.; Farrukh, H.; Ozmen, M. O.; Saha, K.; and Celik, Z. B.\n\n\n \n\n\n\n In Companion Publication of the Conference on Computer-Supported Cooperative Work and Social Computing, 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{arunasalam2024expectation,\n  title={Expectation Conformance in Online Sound Therapy: Designing Tools for Users of Mental Wellbeing Applications},\n  author={Arunasalam, Arjun and Tong, Jason and Farrukh, Habiba and Ozmen, Muslum Ozgur and Saha, Koustuv and Celik, Z. Berkay},\n  booktitle={Companion Publication of the Conference on Computer-Supported Cooperative Work and Social Computing},\n  year={2024}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions.\n \n \n \n\n\n \n Chen, Y.; Arunasalam, A.; and Celik, Z. B.\n\n\n \n\n\n\n In Annual Computer Security Applications Conference (ACSAC), 2023. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{chen2023can,\n  title={Can Large Language Models Provide Security \\& Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions},\n  author={Chen, Yufan and Arunasalam, Arjun and Celik, Z. Berkay},\n  booktitle={Annual Computer Security Applications Conference (ACSAC)},\n  year={2023}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Behind the tube: Exploitative monetization of content on YouTube.\n \n \n \n\n\n \n Chu, A.; Arunasalam, A.; Ozmen, M. O.; and Celik, Z. B.\n\n\n \n\n\n\n In USENIX Security Symposium, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{chu2022behind,\n  title={Behind the tube: Exploitative monetization of content on YouTube},\n  author={Chu, Andrew and Arunasalam, Arjun and Ozmen, Muslum Ozgur and Celik, Z. Berkay},\n  booktitle={USENIX Security Symposium},\n  year={2022}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);