Skip to main content

Jason Hong

Associate Professor, Human Computer Interaction Institute

[Email]

Jason Hong

Research Areas

Privacy Protection, Mobility

Cross Cutting Thrusts

Usable Privacy and Security

Biography

Jason Hong is an associate professor in the Human Computer Interaction Institute, part of the School of Computer Science at Carnegie Mellon University. He works in the areas of ubiquitous computing and usable privacy and security. He is also an author of the book The Design of Sites, a popular book on web design using web design patterns. Jason is also a co-founder of Wombat Security Technologies, which focuses on the human side of computer security. Jason received his PhD from Berkeley and his undergraduate degrees from Georgia Institute of Technology.

Jason is also an Alfred P. Sloan Research Fellow.

Education

Ph.D. (Computer Science) 2005, University of California at Berkeley
B.S. (Discrete Mathematics, Computer Science) 1997, Georgia Institute of Technology

Research Projects

Context-Aware Scalable Authentication: Using passive multi-factor sensing to facilitate authentication

Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

CrowdScanning: Using Crowdsourcing and Static Analysis to understand the Privacy Issues in Smartphone Apps

Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Norman Sadeh

Gort: An analysis tool for understanding the privacy and security behaviors of smartphone apps

Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

Understanding Human Behaviors at Large Scales through Mobile Devices

Research Area: Mobility | Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Norman Sadeh, Justin Cranshaw, Eran Toch

Android App Scanner

Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Janne Lindqvist

Simplifying Logins with Web Ticket

Research Area: Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Eiji Hayashi

Augmenting the Wisdom of Crowds for Anti-Phishing

Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Bryan Pendleton

Casual Authentication

Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Eiji Hayashi

Simplifying Access Control for Home Networking

Research Area: Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Bryan Pendleton

User-Controllable Security and Privacy for Pervasive Computing

Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Jason Hong, Lorrie Cranor, Lujo Bauer

Use Your Illusion: Using Visual Distortion to Secure Image-Based Authentication

Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Nicolas Christin, Eiji Hayashi

User Controllable Security & Privacy for Mobile Social Networking

Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

Visualizing Home Networks

Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

Behavior-Based Malware Email Filtering

Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researchers: Jason Hong, James Hoe

Mobile Users Effectively Control Privacy in a Friend-Finder Application

Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

Machine Learning Techniques for Phishing Attacks

Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Researcher: Jason Hong

Publications

"RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication". Kim, T. H.-J., Yamada, A., Gligor, V. D., Hong, J., & Perrig, A. (2013). Financial Cryptography and Data Security.

"Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference". Kim, T. H.-J., Gligor, V. D., Guajardo, J., Hong, J., & Perrig, A. (2013). Proceedings of the Workshop on Usable Security.

"The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City". Cranshaw, J., Schwartz, R., Hong, J.I. and Sadeh, N. ICWSM 2012.

"The state of phishing attacks". Hong, J. Communications of the ACM 55:1, January 2012. pdf

"CANTINA+: A Feature-rich Machine Learning Framework for Detecting Phishing Web Sites". Xiang, G., J.I. Hong, C.P. Rose, L.F. Cranor. ACM Transactions on Information Systems and Security (ACM TISSEC) 14:2, September 2011. pdf