Publications

The most recent publications are listed chronologically below. The publications are also broken out by topic area towards the bottom of the page.

Kyle Crichton, Abhiram Reddy, Jessica Ji, Ali Crawford, Mia Hoffmann, Colin Shea-Blymyer, and John Bansemer. "Harmonizing AI Guidance: Distilling Voluntary Standards and Best Practices into a Unified Framework". Center for Security and Emerging Technology (CSET 2025). https://cset.georgetown.edu/publication/harmonizing-ai-guidance-distilling-voluntary-standards-and-best-practices-into-a-unified-framework/.
Jin-Dong Dong, Kyle Crichton, Akira Yamada, Yukiko Sawaya, Lorrie Cranor, and Nicolas Christin. "Accurate, Generalizable, and Practical Behavioral Models to Identify Impending User Exposure to Malicious Websites". ACM Transactions on the Web (TWEB 2025). https://doi.org/10.1145/3768587.
Kyle Crichton, Nicolas Christin, and Lorrie Faith Cranor. "Rethinking Fingerprinting: An Assessment of Behavior-based Methods at Scale and Implications for Web Tracking". Privacy Enhancing Technologies Symposium (PETS 2025). https://doi.org/10.56553/popets-2025-0158.

Kyle Crichton, Abhiram Reddy, Jessica Ji, Ali Crawford, Mia Hoffmann, Colin Shea-Blymyer, and John Bansemer. "Harmonizing AI Guidance: Distilling Voluntary Standards and Best Practices into a Unified Framework". Center for Security and Emerging Technology (CSET 2025). https://cset.georgetown.edu/publication/harmonizing-ai-guidance-distilling-voluntary-standards-and-best-practices-into-a-unified-framework/.

Kyle Crichton, Jessica Ji, Kyle Miller, John Bansemer, Zachary Arnold, David Batz, Minwoo Choi, Marisa Decillis, Patricia Eke, Daniel M. Gerstein, Alex Leblang, Monty McGee, Greg Rattray, Luke Richards, and Alana Scott. "Securing Critical Infrastructure in the Age of AI". Center for Security and Emerging Technology (CSET 2024). https://cset.georgetown.edu/publication/securing-critical-infrastructure-in-the-age-of-ai/.
Helen Toner, John Bansemer, Kyle Crichton, Matthew Burtell, Thomas Woodside, Anat Lior, Andrew Lohn, Ashwin Acharya, Beba Cibralic, Chris Painter, Cullen O’Keefe, Iason Gabriel, Kathleen Fisher, Ketan Ramakrishnan, Krystal Jackson, Noam Kolt, Rebecca Crootof, and Samrat Chatterjee. "Through the Chat Window and Into the Real World: Preparing for AI Agents". Center for Security and Emerging Technology (CSET 2024). https://cset.georgetown.edu/publication/through-the-chat-window-and-into-the-real-world-preparing-for-ai-agents/.

Jin-Dong Dong, Kyle Crichton, Akira Yamada, Yukiko Sawaya, Lorrie Cranor, and Nicolas Christin. "Accurate, Generalizable, and Practical Behavioral Models to Identify Impending User Exposure to Malicious Websites". ACM Transactions on the Web (TWEB 2025). https://doi.org/10.1145/3768587.
Kyle Crichton, Nicolas Christin, and Lorrie Faith Cranor. "Rethinking Fingerprinting: An Assessment of Behavior-based Methods at Scale and Implications for Web Tracking". Privacy Enhancing Technologies Symposium (PETS 2025). https://doi.org/10.56553/popets-2025-0158.
Kyle Crichton. "Tracking User Web Browsing Behavior: Privacy Harms and Security Benefits". Carnegie Mellon University (2023). Thesis. https://doi.org/10.1184/R1/24268843.v1.
Kyle Crichton, John Krumm, and Siddharth Suri. "Inferring Sensitive Browsing Information from Online Advertising Profiles". In Submission.

Kyle Crichton, Nicolas Christin, and Lorrie Faith Cranor. "How Do Home Computer Users Browse the Web?". ACM Transactions on the Web, Volume 16, Issue 1, Article 3 (TWEB 2022). https://doi.org/10.1145/3473343.
Akira Yamada, Kyle Crichton, Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, and Nicolas Christin. "On Recruiting and Retaining Users for Security Sensitive Longitudinal Measurement Panels". Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022): 347–366. USENIX Association. https://www.usenix.org/conference/soups2022/presentation/yamada.
Akira Yamada, Yukiko Sawaya Shoma Tanaka, Ayumu Kubota, Nicolas Christin, Kyle Crichton, Jin-Dong Dong, Shun Umemoto, Jun Nakajima, So Matsuda, Reo Matsumura. "Security Behavior Observation for Smartphone: Longterm Monitoring of Smartphones Comparing Desktop Computers". Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). Extended Abstract. USENIX Association, USA. https://www.usenix.org/system/files/soups2020_poster_yamada.pdf.

Maggie Oates, Kyle Crichton, Lorrie Cranor, Storm Budwig, Erica J. L. Weston, Brigette M. Bernagozzi, and Julie Pagaduan. "Audio, video, chat, email, or survey: How much does online interview mode matter?". PLOS ONE, Volume 17, Issue 2 (2022). https://doi.org/10.1371/journal.pone.0263876.

Kyle Crichton, Jason Lee, and Meihan Li. "Incentives for Enabling Two-Factor Authentication in Online Gaming". Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). Extended Abstract. USENIX Association, USA. https://www.usenix.org/sites/default/files/soups2019posters-crichton.pdf.