Publications

Books

  1. Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (2015) Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, Lecture Notes in Computer Science LNCS 8976, Springer Verlag.

Journal Articles

  1. Aron Laszka, Benjamin Johnson, and Jens Grossklags (2018) On the Assessment of Systematic Risk in Networked Systems. ACM Transactions on Internet Technology, 18(4), Article No. 48.
  2. Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, and Rainer Böhme (2015) Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Springer Transactions on Data Hiding and Multimedia Security, 10, 69-91.
  3. Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, and Rainer Böhme (2014) Secure Team Composition to Thwart Insider Threats and Cyberespionage. ACM Transactions on Internet Technology, 14(2-3), Article No. 19.

Conference and Workshop Articles

  1. Felix Fischer, Huang Xiao, Ching-yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Raza, Paul Furley, Nat Buckley, Konstantin Böttinger, Paul Muntean, and Jens Grossklags (2019) Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography, Proceedings of the 28th USENIX Security Symposium (USENIX Security). To appear. Author Version
  2. Jonathan Merlevede, Benjamin Johnson, Jens Grossklags, and Tom Holvoet (2019) Exponential Discounting in Security Games of Timing. Workshop on the Economics of Information Security (WEIS). To appear.
  3. Benjamin Johnson and Paul Laskowski (2018) Privacy, Polarization, and Passage of Divisive Laws. Proceedings of the 2nd IEEE Symposium on Privacy-Aware Computing (PAC). 
  4. Benjamin Johnson, Aron Laszka, Jens Grossklags, and Tyler Moore (2018) Economic Analyses of Security Investments on Cryptocurrency Exchanges. Proceedings of the 2018 IEEE International Conference on Blockchain (BLOCKCHAIN). Accepted as regular paper. Acceptance rate = 15.3%. Author Version Author Version (arXiv)
  5. Benjamin Johnson, Aron Laszka, and Jens Grossklags (2015) Games of Timing for Security in Dynamic Environments. 2015 Conference on Decision and Game Theory for Security (GameSec 2015), London, UK, November 3-4, 2015.
  6. Benjamin Johnson, Paul Laskowski, Thomas Maillart, and John Chuang (2015) Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You. Fourteenth Workshop on the Economics of Information Security (WEIS 2015), Delft, Netherlands, June 22-23, 2015.
  7. Nick Merrill, Thomas Maillart, Benjamin Johnson, John Chuang (2015) Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique. 2nd International Conference on Physiological Computing Systems (PhyCS 2015), Loire Valley, France, February 11-13, 2015.
  8. Aron Laszka, Benjamin Johnson, and Jens Grossklags (2015) When Bitcoin Mining Pools Run Dry. Workshop on Bitcoin Research. 2015.
  9. Benjamin Johnson, Thomas Maillart, and John Chuang (2014) My Thoughts Are Not Your Thoughts. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (pp. 1329-1338). ACM.
  10. Paul Laskowski, Benjamin Johnson, Thomas Maillart, and John Chuang (2014) Government Surveillance and Incentives to Abuse Power. Thirteenth Workshop on the Economics of Information Security (WEIS 2014), State College, PA, June 23-22, 2014.
  11. Benjamin Johnson, Aron Laszka, and Jens Grossklags (2014) The Complexity of Estimating Systematic Risk in Networks. 2014 IEEE 27th Computer Security Foundations Symposium (CSF), IEEE, 2014.
  12. Benjamin Johnson, Aron Laszka, and Jens Grossklags (2014) How Many Down? Toward Understanding Systematic Risk in Networks, 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, June 4-6, 2014. (Acceptance Rate = 20.0%)
  13. Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, and Rainer Böhme (2014) Bitspotting: Detecting Optimal Adaptive Steganography. Digital-Forensics and Watermarking. Springer Berlin Heidelberg, 2014. 3-18.
  14. Aron Laszka, Benjamin Johnson, Jens Grossklags, and Mark Felegyhazi (2014) Estimating Systematic Risk in Real-World Networks, Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security (FC2014), Christ Church, Barbados, March 3-7, 2014. (Acceptance Rate = 22.5%)
  15. Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore (2014) Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools, First Workshop on Bitcoin Research. Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security (FC2014), Christ Church, Barbados, March 3-7, 2014.
  16. Aron Laszka, Benjamin Johnson, and Jens Grossklags (2013) Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks, Proceedings of the 9th Conference on Web and Internet Economics (WINE), Cambridge, MA, December 11-14, 2013. (Paper acceptance rate = 24%)
  17. Aron Laszka, Benjamin Johnson, and Jens Grossklags (2013) Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game, Proceedings of the Fourth Conference on Decision and Game Theory for Security (GameSec 2013), Fort Worth, TX, November 11-12, 2013.
  18. Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, and Rainer Böhme (2013) Bitspotting: Detecting Optimal Adaptive Steganography, Proceedings of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW), Auckland, New Zealand, October 1-4, 2013.
  19. Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, and Rainer Böhme (2013) Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats, Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS), Egham, UK, September 9-13, 2013 , pp. 273-290. (Paper acceptance rate: <18%)
  20. Pascal Schöttle, Benjamin Johnson, Aron Laszka, Jens Grossklags, and Rainer Böhme (2013) A Game- Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding, Proceedings of the 21st European Signal Processing Conference (EUSIPCO), Marrakech, Marocco, September 9-13, 2013.
  21. John Chuang, Hamilton Nguyen, Charles Wang, and Benjamin Johnson (2013) I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves, Proceedings of the 2013 Workshop on Usable Security (USEC 2013), April 1, 2013, Okanawa, Japan.
  22. Benjamin Johnson, Pascal Schöttle, and Rainer Böhme (2012) Where to Hide the Bits, Proceedings of the 3rd Conference on Decision and Game Theory for Security (GameSec 2012), November 5-6, 2012, Budapest, Hungary.
  23. Benjamin Johnson, John Chuang, Jens Grossklags, and Nicolas Christin (2012) Metrics for Measuring ISP Badness: The Case of Spam, Proceedings of the Sixteenth International Conference on Financial Cryptography and Data Security (FC’12), Kralendijk, Bonaire, February 27 - March 2, 2012.
  24. Benjamin Johnson, Rainer Böhme, and Jens Grossklags (2011) Security Games with Market Insurance, Proceedings of the 2nd Conference on Decision and Game Theory for Security (GameSec 2011), November 14-15, 2011, College Park, Maryland.
  25. Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang (2011) Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents, Proceedings of the 2nd International ICST Conference on Game Theory for Networks (GameNets 2011), April 16-18, 2011, Shanghai, China.
  26. Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang (2010) Uncertainty in Interdependent Security Games, Proceedings of the 1st Conference on Decision and Game Theory for Security (Gamesec 2010), November 22-23, 2010, Berlin, Germany.
  27. Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang (2010) Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), September 20-22, 2010, Athens, Greece, pp. 588-606. (Paper acceptance rate: 20.8%)
  28. Benjamin Johnson (2010) The Polynomial Degree of Recursive Fourier Sampling, The 5th Annual Conference on Theory of Quantum Computation, Communication and Cryptography (TQC), April 13-15, 2010, Leeds, UK. To appear in LNCS 6519.
  29. Jens Grossklags, Benjamin Johnson and Nicolas Christin (2010) The Price of Uncertainty in Security Games, T. Moore, D. Pym, and C. Ioannidis (Eds.), ”Economics of Information Security and Privacy”, Springer Verlag, pp. 183-210. ISBN: 978-3-540-77886-8. Lead article. An earlier extended version was presented at the Eighth Workshop on the Economics of Information Security (WEIS 2009), London, UK, June 24-25, 2009.
  30. Jens Grossklags, Benjamin Johnson and Nicolas Christin (2010) When Information Improves Information Security, Proceedings of the Fourteenth International Conference Financial Cryptography and Data Security (FC’10), January 25-28, 2010, Tenerife, Spain. Published in: Radu Sion (Ed.), Lecture Notes in Computer Science (LNCS), No. 6052, Springer Verlag, 2010, pp. 416-423 (paper acceptance rate: 26%). Extended version available as CyLab Technical Report, CMU, No. CMU-CyLab-09-004.
  31. Jens Grossklags and Benjamin Johnson (2009) Uncertainty in the Weakest-link security game, Proceedings of the International Conference on Game Theory for Networks (GameNets 2009), May 13-15, 2009, Istanbul, Turkey, pp. 673-682. Proceedings published by IEEE. ISBN: 978-1-4244-4176-1.
  32. Paul Laskowski, Benjamin Johnson, and John Chuang (2008). User-Directed Routing: From Theory towards Practice, Proceedings of the 3rd International Workshop on Economics of Networked Systems (NetEcon), pp. 1-6, August 22, 2008, Seattle, Washington, USA.

Thesis

  1. Benjamin Johnson (2008). Upper and Lower Bounds for Recursive Fourier Sampling, Ph.D. Thesis, University of California, Berkeley, May 2008.