C I R C L E

The CISPA x LUMS Research Partnership on Internet For Everyone

Lab hero

About CIRCLE

Bridging the Digital Divide through Interdisciplinary Research.

Despite widespread Internet use, many are still excluded from digital resources. Moreover, the Internet often mirrors physical world inequalities, leaving certain groups marginalized and vulnerable. CIRCLE aims to address this societal challenge by making the Internet more accessible to marginalized groups. CIRCLE adopts an interdisciplinary approach, centering humans in all research.

People

The core team behind our efforts.

Directors of CIRCLE

Directors of CIRCLE

Professors

Dr. Katharina Krombholz
Dr. Katharina Krombholz

Tenured Faculty @ CISPA, Adjunct Faculty @ LUMS

Dr. Mobin Javed
Dr. Mobin Javed

Associate Professor @ LUMS

Dr. Muhammad Hamad Alizai
Dr. Muhammad Hamad Alizai

Associate Professor @ LUMS

Dr. Naveed Anwar Bhatti
Dr. Naveed Anwar Bhatti

Assistant Professor @ LUMS

Dr. Maryam Mustafa
Dr. Maryam Mustafa

Associate Professor @ LUMS

Dr. Rebekka Burkholz
Dr. Rebekka Burkholz

Tenured Faculty @ CISPA

Dr. Sven Bugiel
Dr. Sven Bugiel

Tenured Faculty @ CISPA

Dr. Wouter Lueks
Dr. Wouter Lueks

Tenure-Track Faculty @ CISPA

Dr. Nida ul Habib Bajwa
Dr. Nida ul Habib Bajwa

Faculty @ Saarland University

PhD Students

Sumair Ijaz Hashmi
Sumair Ijaz Hashmi

PhD Student @ CISPA, Saarland University

Taha
Taha

PhD Student @ CISPA, Saarland University

Niklas George
Niklas George

PhD Student @ Saarland University

Stefan Kenst
Stefan Kenst

PhD Student @ Saarland University

Muhammad Tahir
Muhammad Tahir

PhD Student @ LUMS

Current Students

  • Yahya KhwajaLUMSProfile
  • Eman NabeelLUMSProfile
  • Sujo PunarPrep Phase Computer Science @ Saarland UniversityProfile
  • Shirin RehmanLUMSProfile

Alumni

    Our alumni remain part of the CIRCLE family as collaborators, mentors, and friends.

  • Dr. Lea GröberPostdoc @ UC BerkeleyProfile
  • Shafay KashifMS Information Technology @ University of AucklandProfile
  • Afaq AshrafPrep Phase Computer Science @ Saarland UniversityProfile
  • Rimsha SarfarazPrep Phase Computer Science @ Saarland UniversityProfile
  • Waleed ArshadMS Computer Science @ University of Wisconsin-MadisonProfile
  • ShanzaMMath Computer Science @ University of WaterlooProfile

Publications

Our peer-reviewed papers have been published in top-tier venues in Security, Privacy, and Human-Computer Interaction.

See Me If You Can: A Multi-Layer Protocol for Bystander Privacy with Consent-Based Restoration

Yahya Khawaja*, Shirin Rehman*, Alexander Ponticello, Divyanshu Bhardwaj, Katharina Krombholz, Naveed Anwar Bhatti, Muhammad Hamad Alizai. (* denotes joint authorship)

ACM CHI 2026 · 2026

Smart GlassesBystander PrivacyConsent
Abstract

The growing popularity of wearable camera glasses raises pressing concerns about bystanders being recorded without their consent. Most existing privacy-enhancing technologies (PETs) rely on opt-out models that place the burden of privacy protection on bystanders. We conducted a qualitative study on wearers' and bystanders' perceptions of opt-in, privacy-by-default approaches for camera glasses. To enable this study, we designed and evaluated an opt-in privacy-by-default protocol. We then conducted semi-structured interviews with camera glass wearers and bystanders (N = 18) to examine their perceptions of the protocol. Our findings show that bystanders viewed the opt-in protocol as essential and advocated for even stronger anonymization. Wearers appreciated the protocol's safeguards but found it visually limiting, expressing desire for a context-dependent version that can be enabled in relevant scenarios. Our findings highlight the need for context-aware PETs that provide effective mechanisms for consent negotiation.

PDF/DOI
Now You See Me, Now You Don't: Consent-Driven Privacy for Smart Glasses

Yahya Khawaja, Eman Nabeel, Sana Humayun, Eruj Javed, Katharina Krombholz, Muhammad Hamad Alizai, Naveed Anwar Bhatti.

IEEE PerCom 2026 · 2026

Smart GlassesConsentPrivacy
Abstract

Smart glasses pose significant privacy challenges by capturing bystanders without notice or consent. Existing solutions often rely on permanent obfuscation, shift responsibility to bystanders, or offload sensitive data to the cloud, risking unauthorized access and denying meaningful control. We present a novel three-tier architecture for privacy-preserving smart glasses that enforces blurring at the point of capture, supports synthetic face replacement, and enables consent-based decryption of visual data. We implement SITARA, a working prototype on Raspberry Pi-based hardware, and demonstrate on-device blurring and secure consent mediation. Our evaluation shows that SITARA operates efficiently while achieving reliable bystander anonymization; furthermore, its synthetic replacement delivers perceptual quality competitive with state-of-the-art baselines, all without exposing raw video or undermining usability.

PDF/DOI
Mapping the Cloud: A Mixed-Methods Study of Cloud Security and Privacy Configuration Challenges

Sumair Ijaz Hashmi*, Shafay Kashif*, Lea Gröber, Katharina Krombholz, Mobin Javed. (* denotes joint authorship)

NDSS 2026 · 2026

Cloud SecurityConfigurationPrivacy
Abstract

Misconfigurations in cloud services remain a leading cause of security and privacy incidents, often stemming from the complexity of configuring cloud platforms. To better understand these challenges, we analyzed approximately 251,900 security- and privacy-related Stack Overflow posts spanning from 2008 to 2024. Using topic modeling and qualitative analysis, we systematically mapped cloud use cases to their associated security and privacy configuration challenges, revealing a comprehensive landscape of the hurdles cloud operators faced. We identified both technical and human-centric issues, including problems related to insufficient documentation and the lack of context-aware tooling tailored to operators' environments. Notably, authentication and access control challenges appeared in all identified use cases, cutting across nearly every stage of cloud deployment, integration, and maintenance. Our findings underscore the need for usable, tailored, and context-sensitive support tools and resources to help developers securely configure cloud services.

PDF/DOI
Understanding the Security Advice Mechanisms of Low Socioeconomic Pakistanis

Sumair Ijaz Hashmi*, Rimsha Sarfaraz*, Lea Gröber, Mobin Javed, Katharina Krombholz. (* denotes joint authorship)

🏆 Honorable Mention at ACM CHI 2025 · 2025

Security AdviceIntermediation
Abstract

Low socioeconomic populations face severe security challenges while being unable to access traditional written advice resources. We present the first study to explore the security advice landscape of low socioeconomic people in Pakistan. With 20 semi-structured interviews, we uncover how they learn and share security advice and what factors enable or limit their advice sharing. Our findings highlight that they heavily rely on community advice and intermediation to establish and maintain security-related practices (such as passwords). We uncover how shifting social environments shape advice dissemination, e.g., across different workplaces. Participants leverage their social structures to protect each other against threats that exploit their financial vulnerability and lack of digital literacy.

PDF/DOI
“I chose to fight, be brave, and to deal with it”: Threat Experiences and Security Practices of Pakistani Content Creators

Lea Gröber, Waleed Arshad, Angelica Goetzen, Elissa M Redmiles, Maryam Mustafa, Katharina Krombholz.

USENIX Security 2024 · 2024

Threat LandscapeContent Creators
Abstract

Content creators are exposed to elevated risks compared to the general Internet user. This study explores the threat landscape that creators in Pakistan are exposed to, how they protect themselves, and which support structures they rely on. We conducted a semi-structured interview study with 23 creators from diverse backgrounds who create content on various topics. Our data suggests that online threats frequently spill over into the offline world, especially for gender minorities. Creating content on sensitive topics like politics, religion, and human rights is associated with elevated risks. We find that defensive mechanisms and external support structures are non-existent, lacking, or inadequately adjusted to the sociocultural context of Pakistan.

PDF/DOI
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space

Maryam Mustafa, Abdul Moeed Asad, Shehrbano Hassan, Urooj Haider, Zainab Durrani, and Katharina Krombholz.

CCS 2023 · 2023

PrivacyGenderTeenagers
Abstract

The understanding of how teenagers perceive, manage and perform privacy is less well-understood in spaces outside of Western, educated, industrialised, rich and democratic countries. To fill this gap we interviewed 30 teens to investigate the privacy perceptions, practices, and experienced digital harms of young people in Pakistan, a particularly interesting context as privacy in this context is not seen as an individual right or performed within an individualistic framework but instead is influenced by a combination of factors including social norms, family dynamics and religious beliefs. Based on our findings, we developed four personas to systematize the needs and values of this specific population and then conducted focus groups with co-design activities to further explore privacy conflicts. Among other things that confirm and extend existing theories on teen's privacy practices and perceptions, our findings suggest that young women are disproportionately impacted by privacy violations and the harms extend beyond themselves to include their families.

PDF/DOI
Training Users to Recognize Persuasion Techniques in Vishing Calls

Sumair Ijaz Hashmi*, Niklas George*, Eimaan Saqib, Fatima Ali, Nawaal Siddique, Shafay Kashif, Shahzaib Ali, Nida Ul Habib Bajwa, Mobin Javed. (* denotes joint authorship)

Extended Abstracts of ACM CHI 2023 · 2023

Social EngineeringPsychological TrainingVishing Simulation
Abstract

Voice-based phishing attacks, in which a scammer uses social engineering techniques over a phone call to convince victims to divulge sensitive information, cause losses of several million dollars. We present a pilot study of a novel intervention that trains users to recognize phishing calls by identifying the persuasion principles used by the scammer. The training is implemented via a Whatsapp chatbot that includes example audio recordings and exercises of scam calls, and how the scammer employs the principle of authority in order to persuade the victim. 50 students from a university participated in the persuasion principles training. We then conducted a simulated vishing call a few days later to test how well the participants recognize the call compared to a control group (also 50 students) that was only given a general awareness training, and was not specifically trained to recognize authority via chatbot exercises. We also conducted interviews with participants from both the groups to understand the perceived usefulness of the training.

PDF/DOI
“Stalking is immoral but not illegal”: Understanding Security, Cyber Crimes and Threats in Pakistan

Afaq Ashraf*, - Taha*, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa. (* denotes joint authorship)

🏆 IAPP SOUPS Privacy Award @ SOUPS 2023 · 2023

Threat LandscapeCyber CrimesYoung Adults
Abstract

We explore the experiences, understandings and perceptions of cyber-threats and crimes amongst young adults in Pakistan, focusing on their mechanisms for protecting themselves, for reporting cyber threats and for managing their digital identities. Relying on data from a qualitative study with 34 participants in combination with a repertory grid analysis with 18 participants, we map users mental models and constructs of cyber crimes and threats, their understanding of digital vulnerabilities, their own personal boundaries and their moral compasses on what constitutes an invasion of privacy of other users in a country where there is little legal legislation governing cyberspace and cyber crimes. Our findings highlight the importance of platform adaptation to accommodate the unique context of countries with limited legal mandates and reporting outlets, the ways in which digital vulnerabilities impact diverse populations, and how security and privacy design can be more inclusive.

PDF/DOI

News

CIRCLE highlights & announcements.

May 7, 2026

Our paper "Mapping the Cloud" got published at NDSS 2026 (Core Rank: A*)! 🚀

May 7, 2026

IEEE PerCom 2026: "Now You See Me, Now You Don't" published by Bachelors students from LUMS 🚀

Jul 4, 2025

Our awesome PhD Student Lea Gröber successfully defended her thesis and graduated with the highest grade 🚀!

Open Positions

Positions are currently closed.

We currently do not have any open positions.

Institutions

This project is a collaborative effort by two partnering institutions: LUMS and CISPA.

Lahore University of Management Sciences
LUMS Logo

The Lahore University of Management Sciences (LUMS) is Pakistan’s leading research intensive university, excelling in teaching and driven by a philosophy of ‘Learning Without Borders’. LUMS provides an integrated curriculum uniting disciplines to focus on solving the grand challenges of South Asia and beyond. LUMS aspires to achieve excellence and national and international leadership through unparalleled teaching and research, holistic undergraduate education, and civic engagement to serve the critical needs of society.

CISPA Helmholtz Center for Information Security
CISPALogo

The CISPA Helmholtz Center for Information Security is a German national Big Science institution within the Helmholtz Association. CISPA researchers explore all aspects of information security. They address the pressing global challenges in cybersecurity, data protection and trustworthy artificial intelligence. Conducting modern foundational research as well as innovative application-oriented research, they work to protect the digital space and improve industrial applications and products. CISPA promotes scientific talent, supports promising founders, and trains experts and executives for business and industry. In this way, it carries its research findings into society and strengthens Germany’s as well as Europe’s competitiveness.

Both institutions have previously collaborated on an EU funded Erasmus+ Project: RECYPHER: Rethinking cybersecurity in Pakistan – Human factors‘ essential role