Abstract
We describe a series of security policy audits that we conducted, exposing policy flaws affecting billions of users that are often exploited by even low-tech attackers. We argue that a systematic study of security policies and processes is sorely needed, and present a research agenda.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have