Cyberspace of Shujun LI
Shortcuts
General
Usable Security/HCI in General:
NIST Visualization and Usability Group
(
NIST Usability and Security,
![Biometrics and Usability Biometrics and Usability](https://www.nist.gov/sites/default/files/styles/960_x_960_limit/public/images/itl/iad/vug/biometrics-usability-banner-sm_3.jpg)
,
Industry Usability Reporting/Standards,
![Industry USability Reporting (IUSR) Project Industry USability Reporting (IUSR) Project](https://www.nist.gov/sites/default/files/styles/480_x_480_limit/public/images/itl/iad/vug/iusr-logo.gif)
)
BCS Usability News
Richard Conlan's Blog on Usable Security
HCISec Bibliography
Soups-announce -- Announcements related to the Symposium On Usable Privacy and Security (SOUPS)
HCI Bibliography
![User Experience Professionals Association (UXPA) User Experience Professionals Association (UXPA)](https://uxpa.org/wp-content/uploads/sites/9/2017/10/cropped-uxpaINTERN_web216x374px-3.png)
(
Usability Body of Knowledge;
![Journal of Usability Studies (JUS) Journal of Usability Studies (JUS)](http://uxpajournal.org/wp-content/themes/JUS/images/JUSlogo11I13_web_150x541px.png)
;
![UK Chapter of the User Experience Professionals' Association UK Chapter of the User Experience Professionals' Association](http://uxpa-uk.org/wp-content/themes/smpl_skeleton/images/uxpaLogo.png)
)
Human-Computer Interaction Resource Network
Human-Centered Computing Education Digital Library
eyemovementresearch.com
Human Cognitive Architectures and Models:
ACT-R
(
ACT-R users primary mailing list)
jACT-R
CCMSuite
(
Python ACT-R)
![CogTool](https://camo.githubusercontent.com/fa2a82d3176cf61fd8969fd2fe05e28d3f5569a3/68747470733a2f2f662e636c6f75642e6769746875622e636f6d2f6173736574732f353937313836302f313735373438382f39343561363235362d363638302d313165332d393366302d6361646334396536636537322e706e67)
(
@github;
CogTool-Explorer)
![Apex Apex](http://apex-autonomy.sourceforge.net/images/apex-cropped.png)
(
Documentation Wiki)
SANLab-CM
(
Old Project Page)
AutoCWW2
Eye-Tracking:
User Authentication and Identity Management
General:
W3C CCG (Credentials Community Group)
(
@W3C)
W3C WebID
![Kantara Initiative Kantara Initiative](http://kantarainitiative.org/wp-content/themes/newsy/uploads/logo/kantara_logo.gif)
(
![Liberty Alliance Liberty Alliance](http://www.projectliberty.org/design/liberty/images/libertylogo.jpg)
)
Risk-based Authentication @ Ruhr University Bochum
National Strategy for Trusted Identities in Cyberspace (NSTIC)
Deidentification@NIST.GOV
Password Checkers, Meters, Crackers and Analyzers:
PasswordResearch.com
Research Papers on Password-based Cryptography
Xato - Passwords & Security
![Have I been pwned? Have I been pwned?](https://pbs.twimg.com/profile_images/414900961371377664/eulz0TdB_bigger.png)
(
Pwned Passwords,
API)
COMB @ GitHub
weakpass.com
![SecLists SecLists](https://camo.githubusercontent.com/78c3052d3f17986584f0e6c6b62295f05e93372d/68747470733a2f2f64616e69656c6d696573736c65722e636f6d2f696d616765732f7365636c697374732d6c6f6e672e706e67)
(
Passwords)
![Skull Security Wiki Skull Security Wiki](https://blog.skullsecurity.org/wp-content/uploads/2013/10/skullsecurity.jpg)
(
Passwords)
Yahoo Password Frequency Corpus
PARS (Password Analysis and Research System)
Password Hashing Competition
Password Multi-Checker Tool @ Concordia
zxcvbn (Dropbox's Password Meter)
CMU-CUPS-CHI2017 data-driven password meter
(
@github)
passwdqc
Google Password Strength API
The Password Meter
password-checker.online-domain-tools.com
(
password-generator.online-domain-tools.com)
howsecureismypassword.net
Oracle Password Checker
Javascript Password Strength Meter
Password Checker @ My1Login
Kaspersky Password Checker
Password Checker @ online-domain-tools.com
Password strength checker @ ProPrivacy
HashView
Hashcat GUI
Password Guessing Framework @ Password 2015
(
GitHub)
THC-Hydra
OMEN (Ordered Markov ENumerator)
RainbowCrack
Cain & Abel
Medusa Parallel Network Login Auditor
fgdump
Phraser
thepasswordproject.com
The Sprawl
(
PACK - Password Analysis and Cracking Toolkit,
automatic password rule analysis and generation)
AccessData Password Recovery Toolkit® (PRTK®)
Pipal (Password Analyser)
(
@Github)
Passpal
Cain and Abel
Password Cracking Corpra:
Mark Kantrowitz's Name Corpus
Oxford Reference "Name Studies" dictionaries
Lists of most common surnames @ Wikipedia
Chinese-Names-Corpus @ GitHub
family_name_handle @ GitHub
汉姓罗马字标注 @ Wikipedia
中国姓氏排名 @ Wikipedia
Password Management and Generation:
Clipperz
(
@Github)
Passphrase Generator @ passphrases.peerio.com
User Authentication:
Graphical User Authentication
fastword
Blue Moon Authentication
![AGSES GmbH AGSES GmbH](https://agses.net/wp-content/uploads/2016/06/agses_logo-e1466595056165-1.png)
(
myAGSES Services)
![SyferLock SyferLock](http://www.syferlock.com/sites/default/files/Sl-logo-15pcnt.png)
(
Grid2Form™,
GridSoftToken™,
GridAdvanced™)
Session Juggler
BlueProximity
How unique are your usernames?
Mobile Security and Privacy:
TaintDroid
AntiTaintDroid (ScrubDroid)
DroidBox
Android-Application-SandBox (AASandbox)
Mobile-Sandbox
Agrigento
![SuSi – Sources and Sinks SuSi – Sources and Sinks](http://blogs.uni-paderborn.de/sse/files/2013/05/android-ss-1-300x300.png)
(
@GitHub)
Android-specific components of FlowDroid
DroidForce
AppAudit: Uncover Hidden Data Leaks in Apps
(
@GitHub)
AppGuardian
ScanDal: Static Analyzer for Detecting Privacy Leaks in Android Applications
Intent Fuzzer
MindMac's IntentFuzzer
![LinkDroid LinkDroid](http://badpopcorn.com/linkdroid/images/LinkDroid_icon96x96.png)
(
@Github)
DroidBench
Stanford SecuriBench
(
Stanford SecuriBench Micro)
UI/Application Exerciser Monkey
monkeyrunner
droidRunner
Dare: Dalvik Retargeting
Androguard
APKinspector
Dedexer
DECAF (Dynamic Executable Code Analysis Framework) + DroidScope
Simplify: Generic Android Deobfuscator
PlayDrone: A Measurement Study of Google Play
ProGuard
XSI-Android
Purple Robot
CopperDroid
EdgeMiner
Tracedroid
Dexter
SandDroid @ XJTU
Akana - Android App Interactive Analysis Enviroment
(
Eacus)
PrivMetrics
PlayDrone
(
@Github,
@archive.org)
Human vs. Security
Human Computation:
Crowdsourcing and Human Computation @ Google Groups
Journal of Artificial Intelligence Research's Special Track on Human Computation and AI
Human Interactive Proofs (HIPs) and Visual Analytics for Security:
HIPs @ Aladdin.CMU
CAPTCHA
![SecVis - Security Visualization SecVis - Security Visualization](http://www.secviz.org/files/bluebreeze_logo.png)
(
![The DAVIX Live CD The DAVIX Live CD](http://www.secviz.org/files/davix_logo_300c.png)
)
Visualisation work @ TREsPASS project
SecHCI
GATE (Graphic Access Tabular Entry)
SEa AUF Image Project
Social Engineering:
![Anti-Phishing Working Group (APWG) Anti-Phishing Working Group (APWG)](https://apwg.org/wp-content/uploads/2018/10/apwg_org.png)
(
![APWG.EU APWG.EU](https://apwg.eu/wp-content/uploads/2017/12/apwg-logo-2.png)
)
Jose Nazario's Phishing Corpus (Nov 2004 - June 2005)
Google Safe Browsing API
(
Protocolv2Spec: Client specification for the Google Safe Browsing v2.2 protocol)
Report Suspected Phishing Sites to Symantec
UAB PhishIQ™ Tool
Phishing and Pharming Information Site
AA419 (Artists Against 419)
Identity Theft Surveys and Studies @ Privacy Rights Clearinghouse
Identity Theft @ Federal Trade Commission (US)
Putting an End to Account-Hijacking Identity Theft @ FDIC (US)
RSA Online Fraud Resource Center
Cisco IronPort Phishing Overview
![Websense Websense](http://www.websense.com/assets/images/wbsn-logo-131x24.png)
(
Security Labs,
Attack Information Center)
![Trustwave Holdings, Inc. Trustwave Holdings, Inc.](https://www.trustwave.com/img/logo/logo-trustwave-white.svg)
(
![SpiderLabs SpiderLabs](https://www.trustwave.com/img/icon/trustwave/svg/tw-spiderlabs.svg)
)
Phishing Security Info @ Panda Security
proofpoint
(
![Wombat Security Technologies Wombat Security Technologies](https://www.wombatsecurity.com/hubfs/Wombat-Web/Images/wombat_security.png)
)
![Javelin Strategy & Research Javelin Strategy & Research](https://www.javelinstrategy.com/sites/default/files/javelin_logo.png)
(
Security, Risk & Fraud)
Web Password Hashing (PwdHash)
![Netcraft Anti-Phishing Toolbar Netcraft Anti-Phishing Toolbar](http://toolbar.netcraft.com/images/logo.png)
(
Netcraft Phishing Site Feed)
Privacy, Anonymity and Internet Censorship
Data Protection and Privacy Laws:
DLA Piper Global Data Protection Laws of the World - World Map
Data Protection and Privacy Legislation Worldwide @ UNCTAD
Data protection around the world @ CNIL
Data Protection Scholars Network (DPSN)
Projects, Campaigns and Working Groups:
Privacy By Design (PbD)
W3C Privacy Page
(
P3P: The Platform for Privacy Preferences)
W3C Privacy Community Group
(
GitHub)
W3C Data Privacy Vocabularies and Controls Community Group
(
GitHub;
DPV - Data Privacy Vocabulary,
DPV Primer,
DPV-GDPR: GDPR Extension for DPV;
GDPRtEXT;
GDPRov)
IETF Geographic Location/Privacy Working Group
MozPETs: Mozilla Privacy Enhancement Technologies
![Free Heaven Project Free Heaven Project](http://freehaven.net/img/fh_top.gif)
(
Anonymity Bibliography)
![Usable Privacy Policy Project Usable Privacy Policy Project](https://www.usableprivacy.org/static/img/usable-privacy-logo.png)
(
Anonymity Bibliography)
PoliPoly: Privacy policy analysis demo
Organizations and Networks:
![Electronic Privacy Information Center (EPIC) Electronic Privacy Information Center (EPIC)](https://upload.wikimedia.org/wikipedia/commons/5/54/EPIC_logo_2017.png)
(
![Privacy.org Privacy.org](http://privacy.org/i/logo3.png)
,
Online Guide to Practical Privacy Tools)
Tactical Technology Collective (Tactical Tech)
International Network of Civil Liberties Organizations (INCLO)
Global Privacy Enforcement Network (GPEN)
OECD Working Party on Information Security and Privacy (WPISP)
![OneTrust OneTrust](https://www.onetrust.com/wp-content/themes/onetrust/images/OneTrustLogo.svg)
(
![DataGuidance DataGuidance](https://www.dataguidance.com/sites/default/files/ot-dataguidance-white.png)
)
The Economics of Privacy
spychips.com
Pandab
Privacy Enhancing Technologies and Products:
UK CDEI's Privacy Enhancing Technologies Adoption Guide
Mozilla - *privacy not included
Companies, Start Ups and Projects in the Privacy Space @ Airtable.com
Onoin Routing
Vidalia
Talis (The Amnestic Incognito Live System)
Freegate
Obscure Me: A Toolbox for Online Privacy
Visual Privacy Advisor
PriBot
(
Polisis,
PoliCompare)
OPP-115 Corpus (ACL 2016) + APP-350 Corpus (PETS 2019) + MAPS Policies Dataset (PETS 2019) + Government Privacy Instructions Corpus (ArXiv 2022) + Connections Between OPP-115 and the GDPR (JURIX 2020) + Opt-out Choice Dataset (WWW 2020) + Opt-out Choice Dataset (EMNLP 2017) + ACL/COLING 2014 Dataset + ASDUS Segmenting Tool
Princeton-Leuven Longitudinal Corpus of Privacy Policies (WWW 2021)
(
GitHub;
Web frontend)
DMOZ-Privacy-Policy-Corpus-CODASPY21
Kuznetsov et al.'s dataset of privacy policies of IoT devices (Sensor 2022)
(
Kuznetsov et al.'s crawler)
WebChoices: Digital Advertising Alliance's Consumer Choice Tool for Web US
Google Ads Settings
Microsoft Personalized Ad Preferences
Yahoo! Ad Interest Manager
BlueKai (Oracle) Consumers Opt-Out Page
AVG PrivacyFix
AVG PrivacyFix
(
testing against the reference server)
Do Not Track
All About Do Not Track (DNT)
![privacy-tech-lab privacy-tech-lab](https://www.privacytechlab.org/optmeowt/static/images/privacytechlab.svg)
(
GitHub;
PrivacyFlash Pro (NDSS 2021);
OptMeowt)
![Abine Abine](https://d1p4fa0g2cgyhv.cloudfront.net/images/web-v2/abine_logo.png)
(
![DeleteMe DeleteMe](https://joindeleteme.com/wp-content/themes/deleteme/assets/svgs/deleteme-color.svg)
,
![Blur Blur](https://www.abine.com/images/Blur-logo-blueOnTrans.png)
)
EFF's Privacy Badger
Privacy Sandbox
PrivySeal
Privacy Budget
IBM Anonymization (EDDI) Library
AmIUnique
ASDUS (Automatic Segment Detection using Unsupervised and Supervised Learning)
![Privacy4Cars Privacy4Cars](https://privacy4cars.com/wp-content/uploads/P4C_New_Logo_Horz_Blue-R-400x60.png)
(
Vehicle Privacy Report™)
GenomePrivacy.org
International Workshop on Genome Privacy and Security
iDASH Privacy & security workshop
PrivacyAlert: a dataset for image privacy prediction (ICWSM 2022)
Internet Censorship and Control:
Collections of Peer-Reviewed Papers on Internet Censorship and Control
Berkman Klein Center for Internet & Society at Harvard University
![Freedom House Freedom House](https://freedomhouse.org/themes/custom/ts_freedomhouse/logo.svg)
(
![Global Internet Freedom Program Global Internet Freedom Program](http://freedomhouse.org/sites/default/files/resize/resize/resize/580792_267595143340233_112058258_n-150x150-122x122-103x103.jpg)
)
![Reporters Without Borders (RWB)/Reporters Sans Frontières (RSF) Reporters Without Borders (RWB)/Reporters Sans Frontières (RSF)](https://upload.wikimedia.org/wikipedia/commons/thumb/0/09/Reporters_Without_Borders.png/200px-Reporters_Without_Borders.png)
(
Internet Freedom)
Golden Shield Project @ Wikipedia
![PIA Research Team PIA Research Team](https://www.privateinternetaccess.com/blog/wp-content/uploads/2021/12/pia-blog-logo-1.png)
(
50 Key Stats About Freedom of the Internet Around the World)
Chinese Firewall Test @ ViewDNS.info
Disclaimer
All information on this website is for personal use and Shujun Li is not responsible for any misuse of information provided. The listed links on any page do not indicate any personal recommendations for any purposes for the visitors of this website, as each link is included for a different reason meaningful for Shujun Li's personal use. Logo files of websites are used to facilitate recognition of the external links, and does not represent endorsement of the corresponding websites for the content of this website. If the use of any logo file violates the copyrights or policies of any individuals or organisations, please contact Shujun Li so that he can removes the logo file or the whole link. Please also help report broken links and broken images on this website.