首页 > 最新文献

Symposium On Usable Privacy and Security最新文献

英文 中文
Usability and security evaluation of GeoPass: a geographic location-password scheme 地理位置密码方案的可用性和安全性评价
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501618
Julie Thorpe, Brent MacRae, Amirali Salehi-Abari
We design, implement, and evaluate GeoPass: an interface for digital map-based authentication where a user chooses a place as his or her password (i.e., a "location-password"). We conducted a multi-session in-lab/at-home user study to evaluate the usability, memorability, and security of location-passwords created with GeoPass. The results of our user study found that 97% of users were able to remember their location-password over the span of 8-9 days and most without any failed login attempts. Users generally welcomed GeoPass; all of the users who completed the study reported that they would at least consider using GeoPass for some of their accounts. We also perform an in-depth usability and security analysis of location-passwords. Our security analysis includes the effect of information that could be gleaned from social engineering. The results of our security analysis show that location-passwords created with GeoPass can have reasonable security against online attacks, even when accounting for social engineering attacks. Based on our results, we suggest GeoPass would be most appropriate in contexts where logins occur infrequently, e.g., as an alternative to secondary authentication methods used for password resets, or for infrequently used online accounts.
我们设计、实现并评估了GeoPass:一个用于基于数字地图的身份验证的接口,用户可以在其中选择一个地方作为他或她的密码(即“位置密码”)。我们进行了一项多会话的实验室/家庭用户研究,以评估使用GeoPass创建的位置密码的可用性、可记忆性和安全性。我们的用户研究结果发现,97%的用户能够在8-9天的时间内记住他们的位置密码,而且大多数用户没有任何登录失败的尝试。用户普遍欢迎GeoPass;所有完成这项研究的用户都报告说,他们至少会考虑对他们的一些账户使用geoass。我们还对位置密码进行了深入的可用性和安全性分析。我们的安全分析包括了可以从社会工程中收集到的信息的影响。我们的安全性分析结果表明,即使考虑到社会工程攻击,使用GeoPass创建的位置密码也可以具有合理的安全性,以抵御在线攻击。根据我们的结果,我们建议在登录不经常发生的情况下,例如,作为用于密码重置的辅助身份验证方法的替代方法,或者用于不经常使用的在线帐户,使用GeoPass是最合适的。
{"title":"Usability and security evaluation of GeoPass: a geographic location-password scheme","authors":"Julie Thorpe, Brent MacRae, Amirali Salehi-Abari","doi":"10.1145/2501604.2501618","DOIUrl":"https://doi.org/10.1145/2501604.2501618","url":null,"abstract":"We design, implement, and evaluate GeoPass: an interface for digital map-based authentication where a user chooses a place as his or her password (i.e., a \"location-password\"). We conducted a multi-session in-lab/at-home user study to evaluate the usability, memorability, and security of location-passwords created with GeoPass. The results of our user study found that 97% of users were able to remember their location-password over the span of 8-9 days and most without any failed login attempts. Users generally welcomed GeoPass; all of the users who completed the study reported that they would at least consider using GeoPass for some of their accounts. We also perform an in-depth usability and security analysis of location-passwords. Our security analysis includes the effect of information that could be gleaned from social engineering. The results of our security analysis show that location-passwords created with GeoPass can have reasonable security against online attacks, even when accounting for social engineering attacks. Based on our results, we suggest GeoPass would be most appropriate in contexts where logins occur infrequently, e.g., as an alternative to secondary authentication methods used for password resets, or for infrequently used online accounts.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
"Little brothers watching you": raising awareness of data leaks on smartphones “小兄弟看着你”:提高人们对智能手机数据泄露的意识
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501616
Rebecca Balebako, Jaeyeon Jung, Wei Lu, L. Cranor, Carolyn Nguyen
Today's smartphone applications expect users to make decisions about what information they are willing to share, but fail to provide sufficient feedback about which privacy-sensitive information is leaving the phone, as well as how frequently and with which entities it is being shared. Such feedback can improve users' understanding of potential privacy leakages through apps that collect information about them in an unexpected way. Through a qualitative lab study with 19 participants, we first discuss misconceptions that smartphone users currently have with respect to two popular game applications that frequently collect the phone's current location and share it with multiple third parties. To measure the gap between users' understanding and actual privacy leakages, we use two types of interfaces that we developed: just-in-time notifications that appear the moment data is shared and a visualization that summarizes the shared data. We then report on participants' perceived benefits and concerns regarding data sharing with smartphone applications after experiencing notifications and having viewed the visualization. We conclude with a discussion on how heightened awareness of users and usable controls can mitigate some of these concerns.
如今的智能手机应用程序希望用户决定他们愿意分享哪些信息,但却无法提供足够的反馈,说明哪些隐私敏感信息正在离开手机,以及这些信息被共享的频率和与哪些实体共享。这样的反馈可以提高用户对应用程序以意想不到的方式收集他们的信息可能造成的隐私泄露的理解。通过对19名参与者的定性实验室研究,我们首先讨论了智能手机用户目前对两款经常收集手机当前位置并与多个第三方分享的流行游戏应用的误解。为了衡量用户的理解和实际隐私泄露之间的差距,我们使用了我们开发的两种类型的界面:一种是在数据共享时出现的即时通知,另一种是汇总共享数据的可视化。然后,我们报告参与者在体验通知并查看可视化后,对与智能手机应用程序共享数据的感知好处和担忧。最后,我们讨论了提高用户意识和可用控件如何减轻这些问题。
{"title":"\"Little brothers watching you\": raising awareness of data leaks on smartphones","authors":"Rebecca Balebako, Jaeyeon Jung, Wei Lu, L. Cranor, Carolyn Nguyen","doi":"10.1145/2501604.2501616","DOIUrl":"https://doi.org/10.1145/2501604.2501616","url":null,"abstract":"Today's smartphone applications expect users to make decisions about what information they are willing to share, but fail to provide sufficient feedback about which privacy-sensitive information is leaving the phone, as well as how frequently and with which entities it is being shared. Such feedback can improve users' understanding of potential privacy leakages through apps that collect information about them in an unexpected way. Through a qualitative lab study with 19 participants, we first discuss misconceptions that smartphone users currently have with respect to two popular game applications that frequently collect the phone's current location and share it with multiple third parties. To measure the gap between users' understanding and actual privacy leakages, we use two types of interfaces that we developed: just-in-time notifications that appear the moment data is shared and a visualization that summarizes the shared data. We then report on participants' perceived benefits and concerns regarding data sharing with smartphone applications after experiencing notifications and having viewed the visualization. We conclude with a discussion on how heightened awareness of users and usable controls can mitigate some of these concerns.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 185
Your attention please: designing security-decision UIs to make genuine risks harder to ignore 请注意:设计安全决策ui,使真正的风险难以被忽视
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501610
Cristian Bravo-Lillo, Saranga Komanduri, L. Cranor, R. Reeder, Manya Sleeper, J. Downs, Stuart E. Schechter
We designed and tested attractors for computer security dialogs: user-interface modifications used to draw users' attention to the most important information for making decisions. Some of these modifications were purely visual, while others temporarily inhibited potentially-dangerous behaviors to redirect users' attention to salient information. We conducted three between-subjects experiments to test the effectiveness of the attractors. In the first two experiments, we sent participants to perform a task on what appeared to be a third-party site that required installation of a browser plugin. We presented them with what appeared to be an installation dialog from their operating system. Participants who saw dialogs that employed inhibitive attractors were significantly less likely than those in the control group to ignore clues that installing this software might be harmful. In the third experiment, we attempted to habituate participants to dialogs that they knew were part of the experiment. We used attractors to highlight a field that was of no value during habituation trials and contained critical information after the habituation period. Participants exposed to inhibitive attractors were two to three times more likely to make an informed decision than those in the control condition.
我们设计并测试了计算机安全对话框的吸引器:用户界面的修改用于将用户的注意力吸引到决策中最重要的信息上。其中一些修改纯粹是视觉上的,而另一些则暂时抑制潜在的危险行为,将用户的注意力转移到重要信息上。我们进行了三个受试者之间的实验来测试吸引子的有效性。在前两个实验中,我们让参与者在一个看似第三方的网站上执行一项任务,该任务需要安装浏览器插件。我们向他们展示了一个来自他们操作系统的安装对话框。与对照组的参与者相比,看到使用抑制性吸引器的对话的参与者更不可能忽视安装该软件可能有害的线索。在第三个实验中,我们试图让参与者习惯于他们知道是实验的一部分的对话。我们使用吸引子来突出显示在习惯试验期间没有价值的领域,并在习惯期后包含关键信息。面对抑制性吸引物的参与者做出明智决定的可能性是对照组的两到三倍。
{"title":"Your attention please: designing security-decision UIs to make genuine risks harder to ignore","authors":"Cristian Bravo-Lillo, Saranga Komanduri, L. Cranor, R. Reeder, Manya Sleeper, J. Downs, Stuart E. Schechter","doi":"10.1145/2501604.2501610","DOIUrl":"https://doi.org/10.1145/2501604.2501610","url":null,"abstract":"We designed and tested attractors for computer security dialogs: user-interface modifications used to draw users' attention to the most important information for making decisions. Some of these modifications were purely visual, while others temporarily inhibited potentially-dangerous behaviors to redirect users' attention to salient information. We conducted three between-subjects experiments to test the effectiveness of the attractors.\u0000 In the first two experiments, we sent participants to perform a task on what appeared to be a third-party site that required installation of a browser plugin. We presented them with what appeared to be an installation dialog from their operating system. Participants who saw dialogs that employed inhibitive attractors were significantly less likely than those in the control group to ignore clues that installing this software might be harmful.\u0000 In the third experiment, we attempted to habituate participants to dialogs that they knew were part of the experiment. We used attractors to highlight a field that was of no value during habituation trials and contained critical information after the habituation period. Participants exposed to inhibitive attractors were two to three times more likely to make an informed decision than those in the control condition.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126995660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 135
What matters to users?: factors that affect users' willingness to share information with online advertisers 什么对用户重要?:影响用户与网络广告商分享信息意愿的因素
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501611
P. Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, L. Cranor
Much of the debate surrounding online behavioral advertising (OBA) has centered on how to provide users with notice and choice. An important element left unexplored is how advertising companies' privacy practices affect users' attitudes toward data sharing. We present the results of a 2,912-participant online study investigating how facets of privacy practices---data retention, access to collected data, and scope of use---affect users' willingness to allow the collection of behavioral data. We asked participants to visit a health website, explained OBA to them, and outlined policies governing data collection for OBA purposes. These policies varied by condition. We then asked participants about their willingness to permit the collection of 30 types of information. We identified classes of information that most participants would not share, as well as classes that nearly half of participants would share. More restrictive data-retention and scope-of-use policies increased participants' willingness to allow data collection. In contrast, whether the data was collected on a well-known site and whether users could review and modify their data had minimal impact. We discuss public policy implications and improvements to user interfaces to align with users' privacy preferences.
围绕在线行为广告(OBA)的争论主要集中在如何向用户提供通知和选择上。广告公司的隐私做法如何影响用户对数据共享的态度,这是一个尚未探讨的重要因素。我们展示了一项2912名参与者的在线研究的结果,该研究调查了隐私实践的各个方面——数据保留、对收集数据的访问和使用范围——如何影响用户允许收集行为数据的意愿。我们要求参与者访问一个健康网站,向他们解释OBA,并概述为OBA目的管理数据收集的政策。这些政策因情况而异。然后,我们询问参与者是否愿意收集30种类型的信息。我们确定了大多数参与者不愿分享的信息类别,以及近一半参与者愿意分享的信息类别。更严格的数据保留和使用范围政策提高了参与者允许收集数据的意愿。相比之下,数据是否在知名网站上收集以及用户是否可以查看和修改他们的数据的影响最小。我们讨论了公共政策的影响和用户界面的改进,以与用户的隐私偏好保持一致。
{"title":"What matters to users?: factors that affect users' willingness to share information with online advertisers","authors":"P. Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, L. Cranor","doi":"10.1145/2501604.2501611","DOIUrl":"https://doi.org/10.1145/2501604.2501611","url":null,"abstract":"Much of the debate surrounding online behavioral advertising (OBA) has centered on how to provide users with notice and choice. An important element left unexplored is how advertising companies' privacy practices affect users' attitudes toward data sharing. We present the results of a 2,912-participant online study investigating how facets of privacy practices---data retention, access to collected data, and scope of use---affect users' willingness to allow the collection of behavioral data. We asked participants to visit a health website, explained OBA to them, and outlined policies governing data collection for OBA purposes. These policies varied by condition. We then asked participants about their willingness to permit the collection of 30 types of information. We identified classes of information that most participants would not share, as well as classes that nearly half of participants would share. More restrictive data-retention and scope-of-use policies increased participants' willingness to allow data collection. In contrast, whether the data was collected on a well-known site and whether users could review and modify their data had minimal impact. We discuss public policy implications and improvements to user interfaces to align with users' privacy preferences.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125306327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 144
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources 请求原谅比获得许可更好:智能手机资源的归属机制
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501605
Christopher Thompson, Maritza L. Johnson, Serge Egelman, D. Wagner, J. King
Smartphone applications pose interesting security problems because the same resources they use to enhance the user experience may also be used in ways that users might find objectionable. We performed a set of experiments to study whether attribution mechanisms could help users understand how smartphone applications access device resources. First, we performed an online survey and found that, as attribution mechanisms have become available on the Android platform, users notice and use them. Second, we designed new attribution mechanisms; a qualitative experiment suggested that our proposed mechanisms are intuitive to understand. Finally, we performed a laboratory experiment in which we simulated application misbehaviors to observe whether users equipped with our attribution mechanisms were able to identify the offending applications. Our results show that, for users who notice application misbehaviors, these attribution mechanisms are significantly more effective than the status quo.
智能手机应用程序带来了有趣的安全问题,因为它们用于增强用户体验的相同资源也可能被用于用户可能会反感的方式。我们进行了一系列实验来研究归因机制是否可以帮助用户理解智能手机应用程序如何访问设备资源。首先,我们进行了一项在线调查,发现随着归属机制在Android平台上的普及,用户会注意到并使用它们。第二,我们设计了新的归因机制;一个定性实验表明,我们提出的机制是直观的理解。最后,我们进行了一个实验室实验,模拟应用程序的不当行为,以观察配备我们的归因机制的用户是否能够识别违规应用程序。我们的研究结果表明,对于发现应用程序错误行为的用户来说,这些归因机制明显比现状更有效。
{"title":"When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources","authors":"Christopher Thompson, Maritza L. Johnson, Serge Egelman, D. Wagner, J. King","doi":"10.1145/2501604.2501605","DOIUrl":"https://doi.org/10.1145/2501604.2501605","url":null,"abstract":"Smartphone applications pose interesting security problems because the same resources they use to enhance the user experience may also be used in ways that users might find objectionable. We performed a set of experiments to study whether attribution mechanisms could help users understand how smartphone applications access device resources. First, we performed an online survey and found that, as attribution mechanisms have become available on the Android platform, users notice and use them. Second, we designed new attribution mechanisms; a qualitative experiment suggested that our proposed mechanisms are intuitive to understand. Finally, we performed a laboratory experiment in which we simulated application misbehaviors to observe whether users equipped with our attribution mechanisms were able to identify the offending applications. Our results show that, for users who notice application misbehaviors, these attribution mechanisms are significantly more effective than the status quo.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Confused Johnny: when automatic encryption leads to confusion and mistakes 当自动加密导致混乱和错误时
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501609
Scott Ruoti, Nathan Kim, Benjamin W. Burgon, Timothy W. van der Horst, K. Seamons
A common approach to designing usable security is to hide as many security details as possible from the user to reduce the amount of information and actions a user must encounter. This paper gives an overview of Pwm (Private Webmail), our secure webmail system that uses security overlays to integrate tightly with existing webmail services like Gmail. Pwm's security is mostly transparent, including automatic key management and automatic encryption. We describe a series of Pwm user studies indicating that while nearly all users can use the system without any prior training, the security details are so transparent that a small percentage of users mistakenly sent out unencrypted messages and some users are unsure whether they should trust Pwm. We then conducted user studies with an alternative prototype to Pwm that uses manual encryption. Surprisingly users were accepting of the extra steps of cutting and pasting ciphertext themselves. They avoided mistakes and had more trust in the system with manual encryption. Our results suggest that designers may want to reconsider manual encryption as a way to reduce transparency and foster greater trust.
设计可用安全性的一种常用方法是对用户隐藏尽可能多的安全细节,以减少用户必须遇到的信息和操作的数量。本文概述了Pwm (Private Webmail),我们的安全网络邮件系统,它使用安全覆盖与现有的网络邮件服务(如Gmail)紧密集成。Pwm的安全性基本上是透明的,包括自动密钥管理和自动加密。我们描述了一系列Pwm用户研究,表明虽然几乎所有用户都可以在没有任何事先培训的情况下使用该系统,但安全细节是如此透明,以至于一小部分用户错误地发送了未加密的消息,一些用户不确定他们是否应该信任Pwm。然后,我们对使用手动加密的Pwm替代原型进行了用户研究。令人惊讶的是,用户接受了自己剪切和粘贴密文的额外步骤。他们避免了错误,并且对手动加密的系统更加信任。我们的研究结果表明,设计师可能需要重新考虑手动加密,以减少透明度和培养更大的信任。
{"title":"Confused Johnny: when automatic encryption leads to confusion and mistakes","authors":"Scott Ruoti, Nathan Kim, Benjamin W. Burgon, Timothy W. van der Horst, K. Seamons","doi":"10.1145/2501604.2501609","DOIUrl":"https://doi.org/10.1145/2501604.2501609","url":null,"abstract":"A common approach to designing usable security is to hide as many security details as possible from the user to reduce the amount of information and actions a user must encounter. This paper gives an overview of Pwm (Private Webmail), our secure webmail system that uses security overlays to integrate tightly with existing webmail services like Gmail. Pwm's security is mostly transparent, including automatic key management and automatic encryption. We describe a series of Pwm user studies indicating that while nearly all users can use the system without any prior training, the security details are so transparent that a small percentage of users mistakenly sent out unencrypted messages and some users are unsure whether they should trust Pwm. We then conducted user studies with an alternative prototype to Pwm that uses manual encryption. Surprisingly users were accepting of the extra steps of cutting and pasting ciphertext themselves. They avoided mistakes and had more trust in the system with manual encryption. Our results suggest that designers may want to reconsider manual encryption as a way to reduce transparency and foster greater trust.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125442528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Exploring the design space of graphical passwords on smartphones 探索智能手机图形密码的设计空间
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501615
F. Schaub, Marcel Walch, Bastian Könings, M. Weber
Smartphones have emerged as a likely application area for graphical passwords, because they are easier to input on touchscreens than text passwords. Extensive research on graphical passwords and the capabilities of modern smartphones result in a complex design space for graphical password schemes on smartphones. We analyze and describe this design space in detail. In the process, we identify and highlight interrelations between usability and security characteristics, available design features, and smartphone capabilities. We further show the expressiveness and utility of the design space in the development of graphical passwords schemes by implementing five different existing graphical password schemes on one smartphone platform. We performed usability and shoulder surfing experiments with the implemented schemes to validate identified relations in the design space. From our results, we derive a number of helpful insights and guidelines for the design of graphical passwords.
智能手机已成为图形密码的一个可能应用领域,因为在触摸屏上输入图形密码比输入文本密码更容易。对图形密码和现代智能手机功能的广泛研究导致智能手机图形密码方案的复杂设计空间。我们对这个设计空间进行了详细的分析和描述。在此过程中,我们确定并强调可用性和安全特性、可用设计特性和智能手机功能之间的相互关系。我们通过在一个智能手机平台上实现五种不同的现有图形密码方案,进一步展示了图形密码方案开发中设计空间的表现力和实用性。我们对实现的方案进行了可用性和肩部冲浪实验,以验证设计空间中确定的关系。从我们的结果中,我们得出了一些有用的见解和图形密码设计指南。
{"title":"Exploring the design space of graphical passwords on smartphones","authors":"F. Schaub, Marcel Walch, Bastian Könings, M. Weber","doi":"10.1145/2501604.2501615","DOIUrl":"https://doi.org/10.1145/2501604.2501615","url":null,"abstract":"Smartphones have emerged as a likely application area for graphical passwords, because they are easier to input on touchscreens than text passwords. Extensive research on graphical passwords and the capabilities of modern smartphones result in a complex design space for graphical password schemes on smartphones. We analyze and describe this design space in detail. In the process, we identify and highlight interrelations between usability and security characteristics, available design features, and smartphone capabilities. We further show the expressiveness and utility of the design space in the development of graphical passwords schemes by implementing five different existing graphical password schemes on one smartphone platform. We performed usability and shoulder surfing experiments with the implemented schemes to validate identified relations in the design space. From our results, we derive a number of helpful insights and guidelines for the design of graphical passwords.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
CASA: context-aware scalable authentication CASA:上下文感知的可扩展身份验证
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501607
Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason I. Hong, Ian Oakley
We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to choose an appropriate form of active authentication (e.g., typing a PIN) based on the combination of multiple passive factors (e.g., a user's current location) for authentication. We provide a probabilistic framework for dynamically selecting an active authentication scheme that satisfies a specified security requirement given passive factors. We also present the results of three user studies evaluating the feasibility and users' receptiveness of our concept. Our results suggest that location data has good potential as a passive factor, and that users can reduce up to 68% of active authentications when using an implementation of CASA, compared to always using fixed active authentication. Furthermore, our participants, including those who do not using any security mechanisms on their phones, were very positive about CASA and amenable to using it on their phones.
我们引入上下文感知的可扩展身份验证(CASA)作为一种平衡身份验证安全性和可用性的方法。我们的核心思想是根据多个被动因素(例如用户当前位置)的组合选择适当的主动身份验证形式(例如,输入PIN)进行身份验证。我们提供了一个概率框架,在给定被动因素的情况下动态选择满足特定安全需求的主动认证方案。我们还提出了三个用户研究的结果,以评估我们的概念的可行性和用户的接受程度。我们的研究结果表明,位置数据作为被动因素具有良好的潜力,与始终使用固定的主动身份验证相比,用户在使用CASA实现时可以减少多达68%的主动身份验证。此外,我们的参与者,包括那些没有在手机上使用任何安全机制的参与者,对CASA非常积极,并愿意在手机上使用CASA。
{"title":"CASA: context-aware scalable authentication","authors":"Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason I. Hong, Ian Oakley","doi":"10.1145/2501604.2501607","DOIUrl":"https://doi.org/10.1145/2501604.2501607","url":null,"abstract":"We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to choose an appropriate form of active authentication (e.g., typing a PIN) based on the combination of multiple passive factors (e.g., a user's current location) for authentication. We provide a probabilistic framework for dynamically selecting an active authentication scheme that satisfies a specified security requirement given passive factors. We also present the results of three user studies evaluating the feasibility and users' receptiveness of our concept. Our results suggest that location data has good potential as a passive factor, and that users can reduce up to 68% of active authentications when using an implementation of CASA, compared to always using fixed active authentication. Furthermore, our participants, including those who do not using any security mechanisms on their phones, were very positive about CASA and amenable to using it on their phones.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123151081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 155
Modifying smartphone user locking behavior 修改智能手机用户锁定行为
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501614
D. V. Bruggen, Shu Liu, Mitchell D. Kajzer, A. Striegel, C. Crowell, J. D'Arcy
With an increasing number of organizations allowing personal smart phones onto their networks, considerable security risk is introduced. The security risk is exacerbated by the tremendous heterogeneity of the personal mobile devices and their respective installed pool of applications. Furthermore, by virtue of the devices not being owned by the organization, the ability to authoritatively enforce organizational security polices is challenging. As a result, a critical part of organizational security is the ability to drive user security behavior through either on-device mechanisms or security awareness programs. In this paper, we establish a baseline for user security behavior from a population of over one hundred fifty smart phone users. We then systematically evaluate the ability to drive behavioral change via messaging centered on morality, deterrence, and incentives. Our findings suggest that appeals to morality are most effective over time, whereas deterrence produces the most immediate reaction. Additionally, our findings show that while a significant portion of users are securing their devices without prior intervention, it is difficult to influence change in those who do not.
随着越来越多的组织允许个人智能手机进入他们的网络,引入了相当大的安全风险。个人移动设备及其各自安装的应用程序池的巨大异质性加剧了安全风险。此外,由于设备不属于组织所有,因此以权威方式执行组织安全策略的能力具有挑战性。因此,组织安全的一个关键部分是通过设备上机制或安全意识程序驱动用户安全行为的能力。在本文中,我们从150多名智能手机用户中建立了用户安全行为的基线。然后,我们系统地评估通过以道德、威慑和激励为中心的信息来推动行为改变的能力。我们的研究结果表明,随着时间的推移,诉诸道德是最有效的,而威慑则会产生最直接的反应。此外,我们的研究结果表明,虽然很大一部分用户在没有事先干预的情况下保护了他们的设备,但很难影响那些没有干预的用户的变化。
{"title":"Modifying smartphone user locking behavior","authors":"D. V. Bruggen, Shu Liu, Mitchell D. Kajzer, A. Striegel, C. Crowell, J. D'Arcy","doi":"10.1145/2501604.2501614","DOIUrl":"https://doi.org/10.1145/2501604.2501614","url":null,"abstract":"With an increasing number of organizations allowing personal smart phones onto their networks, considerable security risk is introduced. The security risk is exacerbated by the tremendous heterogeneity of the personal mobile devices and their respective installed pool of applications. Furthermore, by virtue of the devices not being owned by the organization, the ability to authoritatively enforce organizational security polices is challenging. As a result, a critical part of organizational security is the ability to drive user security behavior through either on-device mechanisms or security awareness programs. In this paper, we establish a baseline for user security behavior from a population of over one hundred fifty smart phone users. We then systematically evaluate the ability to drive behavioral change via messaging centered on morality, deterrence, and incentives. Our findings suggest that appeals to morality are most effective over time, whereas deterrence produces the most immediate reaction. Additionally, our findings show that while a significant portion of users are securing their devices without prior intervention, it is difficult to influence change in those who do not.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124168913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Formal definitions for usable access control rule sets from goals to metrics 从目标到度量的可用访问控制规则集的正式定义
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501606
Matthias Beckerle, L. Martucci
Access control policies describe high level requirements for access control systems. Access control rule sets ideally translate these policies into a coherent and manageable collection of Allow/Deny rules. Designing rule sets that reflect desired policies is a difficult and time-consuming task. The result is that rule sets are difficult to understand and manage. The goal of this paper is to provide means for obtaining usable access control rule sets, which we define as rule sets that (i) reflect the access control policy and (ii) are easy to understand and manage. In this paper, we formally define the challenges that users face when generating usable access control rule sets and provide formal tools to handle them more easily. We started our research with a pilot study in which specialists were interviewed. The objective was to list usability challenges regarding the management of access control rule sets and verify how those challenges were handled by specialists. The results of the pilot study were compared and combined with results from related work and refined into six novel, formally defined metrics that are used to measure the security and usability aspects of access control rule sets. We validated our findings with two user studies, which demonstrate that our metrics help users generate statistically significant better rule sets.
访问控制策略描述了访问控制系统的高级需求。访问控制规则集理想地将这些策略转换为一致且可管理的允许/拒绝规则集合。设计反映所需策略的规则集是一项困难且耗时的任务。其结果是规则集难以理解和管理。本文的目标是提供获取可用访问控制规则集的方法,我们将其定义为(i)反映访问控制策略和(ii)易于理解和管理的规则集。在本文中,我们正式定义了用户在生成可用的访问控制规则集时面临的挑战,并提供了更容易处理这些挑战的正式工具。我们的研究开始于一项试点研究,在这项研究中,专家们接受了采访。目标是列出与访问控制规则集管理相关的可用性挑战,并验证专家如何处理这些挑战。将试点研究的结果与相关工作的结果进行比较和结合,并将其细化为六个新的、正式定义的度量标准,用于度量访问控制规则集的安全性和可用性方面。我们通过两个用户研究验证了我们的发现,这表明我们的指标可以帮助用户生成具有统计意义的更好的规则集。
{"title":"Formal definitions for usable access control rule sets from goals to metrics","authors":"Matthias Beckerle, L. Martucci","doi":"10.1145/2501604.2501606","DOIUrl":"https://doi.org/10.1145/2501604.2501606","url":null,"abstract":"Access control policies describe high level requirements for access control systems. Access control rule sets ideally translate these policies into a coherent and manageable collection of Allow/Deny rules. Designing rule sets that reflect desired policies is a difficult and time-consuming task. The result is that rule sets are difficult to understand and manage. The goal of this paper is to provide means for obtaining usable access control rule sets, which we define as rule sets that (i) reflect the access control policy and (ii) are easy to understand and manage. In this paper, we formally define the challenges that users face when generating usable access control rule sets and provide formal tools to handle them more easily. We started our research with a pilot study in which specialists were interviewed. The objective was to list usability challenges regarding the management of access control rule sets and verify how those challenges were handled by specialists. The results of the pilot study were compared and combined with results from related work and refined into six novel, formally defined metrics that are used to measure the security and usability aspects of access control rule sets. We validated our findings with two user studies, which demonstrate that our metrics help users generate statistically significant better rule sets.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
期刊
Symposium On Usable Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1