Author archives

Scott Ruoti - I take an interdisciplinary approach to research, applying research methods from diverse areas ranging from applied cryptography to human-computer interaction. For example, when I begin investigating a new problem, I first collaborate with application-domain experts and conduct user studies of stakeholders to identify key requirements and design constraints. Next, I design cryptographic protocols and develop proof-of-concept prototypes that address identified needs. Third, I conduct empirical evaluations to ensure that these prototypes satisfy the stakeholder requirements and stay within the identified design constraints in real-world usage. Critically, these evaluations include both technical evaluations—such as measuring latency or demonstrating the ability to stop an attack—and user-centered evaluations—such as usability testing and longitudinal studies. Notably, I am one of only a few researchers who takes such a holistic approach to security research.

How QR codes work and what makes them dangerous – a computer scientist explains

Scott Ruoti, Assistant Professor of Computer Science, University of Tennessee discusses security issues respective to QR codes. He states that these codes are not inherently dangerous. They are simply a way to store data. However, just as it can be hazardous to click links in emails, visiting URLs stored in QR codes can also be risky in several ways.

Subjects: Cybercrime, Cybersecurity, Privacy, Spyware