outline
play

Outline Tor experiences and challenges (contd) Usability and - PDF document

Outline Tor experiences and challenges (contd) Usability and security CSci 5271 Announcements intermission Introduction to Computer Security Usability and Voting combined slides Usable security example areas Stephen McCamant Elections


  1. Outline Tor experiences and challenges (cont’d) Usability and security CSci 5271 Announcements intermission Introduction to Computer Security Usability and Voting combined slides Usable security example areas Stephen McCamant Elections and their security University of Minnesota, Computer Science & Engineering System security of electronic voting End-to-end verification Intersection attacks Exit sniffing Suppose you use Tor to update a pseudonymous blog, reveal you live in Minneapolis Easy mistake to make: log in to an HTTP web site Comcast can tell who in the city was sending to Tor over Tor at the moment you post an entry A malicious exit node could now steal your password Anonymity set of 1000 ✦ reasonable protection Another reason to always use HTTPS for logins But if you keep posting, adversary can keep narrowing down the set Browser bundle JS attack Outline Tor experiences and challenges (cont’d) Tor’s Browser Bundle disables many features try to Usability and security stop tracking But, JavaScript defaults to on Announcements intermission Usability for non-expert users Usable security example areas Fingerprinting via NoScript settings Elections and their security Was incompatible with Firefox auto-updating System security of electronic voting Many Tor users de-anonymized in August 2013 by JS vulnerability patched in June End-to-end verification Users are not ‘ideal components’ Most users are benign and sensible On the other hand, you can’t just treat users as Frustrates engineers: cannot give users instructions adversaries like a computer Some level of trust is inevitable Your institution is not a prison Closest approximation: military Also need to take advantage of user common sense Unrealistic expectations are bad for security and expertise A resource you can’t afford to pass up

  2. Don’t blame users Users as rational Economic perspective: users have goals and pursue “User error” can be the end of a discussion them This is a poor excuse They’re just not necessarily aligned with security Almost any “user error” could be avoidable with Ignoring a security practice can be rational if the better systems and procedures rewards is greater than the risk Perspectives from psychology User attention is a resource Users become habituated to experiences and Users have limited attention to devote to security processes Exaggeration: treat as fixed Learn “skill” of clicking OK in dialog boxes If you waste attention on unimportant things, it won’t Heuristic factors affect perception of risk be available when you need it Level of control, salience of examples Social pressures can override security rules Fable of the boy who cried wolf “Social engineering” attacks Research: ecological validity Research: deception and ethics User behavior with respect to security is hard to Have to be very careful about ethics of experiments study with human subjects Experimental settings are not like real situations Enforced by institutional review systems Subjects often: When is it acceptable to deceive subjects? Have little really at stake Many security problems naturally include deception Expect experimenters will protect them Do what seems socially acceptable Do what they think the experimenters want Outline Tor technique question Tor experiences and challenges (cont’d) Officially the name of the Tor network is not an acronym, but the “or” Usability and security part of the name originated from this technique it uses: Announcements intermission A. onion routing Usable security example areas B. oatmeal reciprocity C. one-time resilience Elections and their security D. oilseed relaying System security of electronic voting E. oblivious ratcheting End-to-end verification

  3. Because of last Wednesday’s closure Upcoming schedule Wed. 12/4: 4 project presentations Bitcoin and electronic cash will not be part of this Fri. 12/6: Exercise set 5 due (extended from Wed.) semester’s course Mon. 12/9: 4 project presentations Still accepting late submissions of project progress Wed. 12/11: 4 project presentations, course reports evaluations, final reports due Exercise set 5 release delayed, available now Sat. 12/14: Final exam 10:30am Project presentations Outline Tor experiences and challenges (cont’d) Schedule on Canvas discussion board Usability and security 15 minute slots, prepare 10 minute presentation Announcements intermission Extra time for audience Q&A, switching logistics Usable security example areas Prefer to have just one person present Safest: your own laptop with HDMI port Elections and their security This room also has VGA and USB-C, come early to test System security of electronic voting My laptop or remote presentation possible with prior End-to-end verification discussion Email encryption Phishing Technology became available with PGP in the early Attacker sends email appearing to come from an 90s institution you trust Classic depressing study: “Why Johnny can’t Links to web site where you type your password, encrypt: a usability evaluation of PGP 5.0” (USENIX etc. Security 1999) Spear phishing : individually targeted, can be much Still an open “challenge problem” more effective Also some other non-UI difficulties: adoption, govt. policy Phishing defenses SSL warnings: prevalence Browsers will warn on SSL certificate problems Educate users to pay attention to ❳ : Spelling ✦ copy from real emails In the wild, most are false positives URL ✦ homograph attacks ❢♦♦✳❝♦♠ vs. ✇✇✇✳❢♦♦✳❝♦♠ SSL “lock” icon ✦ fake lock icon, or SSL-hosted attack Recently expired Technical problems with validation Extended validation (green bar) certificates Self-signed certificates (HA2) Phishing URL blacklists Classic warning-fatigue danger

  4. Older SSL warning SSL warnings: effectiveness Early warnings fared very poorly in lab settings Recent browsers have a new generation of designs: Harder to click through mindlessly Persistent storage of exceptions Recent telemetry study: they work pretty well Modern Firefox warning Modern Firefox warning (2) Modern Firefox warning (3) Spam-advertised purchases “Replica” Rolex watches, herbal ❱✦❅❣r❅ , etc. This business is clearly unscrupulous; if I pay, will I get anything at all? Empirical answer: yes, almost always Not a scam, a black market Importance of credit-card bank relationships Advance fee fraud Trusted UI “Why do Nigerian Scammers say they are from Tricky to ask users to make trust decisions based Nigeria?” (Herley, WEIS 2012) on UI appearance Short answer: false positives Lock icon in browser, etc. Attacking code can draw lookalike indicators Sending spam is cheap But, luring victims is expensive Lock favicon Scammer wants to minimize victims who respond but Picture-in-picture attack ultimately don’t pay

  5. Smartphone app permissions Permissions manifest Smartphone OSes have more fine-grained Android approach: present listed of requested per-application permissions permissions at install time Access to GPS, microphone Access to address book Can be hard question to answer hypothetically Make calls Users may have hard time understanding implications Phone also has more tempting targets User choices seem to put low value on privacy Users install more apps from small providers Time-of-use checks Outline Tor experiences and challenges (cont’d) Usability and security iOS approach: for narrower set of permissions, ask on each use Announcements intermission Proper context makes decisions clearer Usable security example areas But, have to avoid asking about common things Elections and their security iOS app store is also more closely curated System security of electronic voting End-to-end verification Elections as a challenge problem History of US election mechanisms For first century or so, no secrecy Elections require a tricky balance of openness and Secret ballot adopted in late 1800s secrecy Punch card ballots allowed machine counting Important to society as a whole Common by 1960s, as with computers But not a big market Still common in 2000, decline thereafter Computer security experts react to proposals that How to add more technology and still have high seem insecure security? Election integrity Secrecy, vote buying and coercion Alice’s vote can’t be matched with her name Tabulation should reflect actual votes (unlinkable anonymity) No valid votes removed No fake votes inserted Alice can’t prove to Bob who she voted for Best: attacker can’t change votes (receipt-free) Best we can do to discourage: Easier: attacker can’t change votes without getting Bob pays Alice $50 for voting for Charlie caught Bob fires Alice if she doesn’t vote for Charlie

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend