1
Usable security and the human in the loop
Michelle Mazurek
Some slides adapted from Lujo Bauer, Lorrie Cranor, Rob Reeder, Blase Ur, and Yinqian Zhang
Usable security and the human in the loop Michelle Mazurek Some - - PowerPoint PPT Presentation
Usable security and the human in the loop Michelle Mazurek Some slides adapted from Lujo Bauer, Lorrie Cranor, Rob Reeder, Blase Ur, and Yinqian Zhang 1 Todays class Introducing me Introducing you Human Factors for Security and
1
Some slides adapted from Lujo Bauer, Lorrie Cranor, Rob Reeder, Blase Ur, and Yinqian Zhang
2
3
4
5
Network Security: PRIVATE Communication in a PUBLIC World. 2nd edition. Prentice Hall, page 237, 2002.
6
7
8
9
10
11
Security Usability/HCI Usable Security Humans are a secondary constraint compared to security concerns Humans are the primary constraint, security is rarely considered Human factors and security are both primary constraints Humans considered primarily in their role as adversaries/attackers Concerned about human error but not human attackers Concerned about both normal users and adversaries Involves threat models Involves task models, mental models, cognitive models Involves threat models AND task models, mental models, etc. Focus on security metrics Focus on usability metrics Considers usability and security metrics together User studies are rare User studies are common User studies common,
distraction
12
Security Usability/HCI Usable Security Humans are a secondary constraint compared to security concerns Humans are the primary constraint, security is rarely considered Human factors and security are both primary constraints Humans considered primarily in their role as adversaries/attackers Concerned about human error but not human attackers Concerned about both normal users and adversaries Involves threat models Involves task models, mental models, cognitive models Involves threat models AND task models, mental models, etc. Focus on security metrics Focus on usability metrics Considers usability and security metrics together User studies are rare User studies are common User studies common,
distraction
13
Security Usability/HCI Usable Security What is the space of possible passwords? How can we make the password space larger to make the password harder to guess? How are the stored passwords secured? Can an attacker gain knowledge by observing a user entering her password? How difficult is it for a user to create, remember, and enter a graphical password? How long does it take? How hard is it for users to learn the system? Are users motivated to put in effort to create good passwords? Is the system accessible using a variety of devices, for users with disabilities? All the security/privacy and usability HCI questions How do users select graphical passwords? How can we help them choose passwords harder for attackers to predict? As the password space increases, what are the impacts on usability factors and predictability
14
Security Usability/HCI Usable Security What is the space of possible passwords? How can we make the password space larger to make the password harder to guess? How are the stored passwords secured? Can an attacker gain knowledge by observing a user entering her password? How difficult is it for a user to create, remember, and enter a graphical password? How long does it take? How hard is it for users to learn the system? Are users motivated to put in effort to create good passwords? Is the system accessible using a variety of devices, for users with disabilities? All the security/privacy and usability HCI questions How do users select graphical passwords? How can we help them choose passwords harder for attackers to predict? As the password space increases, what are the impacts on usability factors and predictability
15
16
17
Image from http://www.trypap.com
18
Image from http://www.techradar.com
19
Image from http://www.economist.com Image from http:// www.sciencedaily.com
20
Image from http://www.wikipedia.org
21
Image from http:// www.wikipedia.org Image from http://www.jhalderm.com
22
23
24
25
Screenshot from http://www.tosdr.org
26
Image from http://www.about.com
27
Image from http://www.ftc.gov
Image from http:// www.makezine.com
28
29
Image from http://www.nokia.com Image from http:// www.arstechnica.com
30
31
Image from http:// www.motortrend.com Image from http:// www.allaboutsymbian.com Image from http:// www.hcwreview.com
32
33
Image from http://www.quickmeme.com
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
Case study #1:
53
A User Study of Policy icy Cr Creat eation in a Flexible Access-Contr ion in a Flexible Access-Control System.
Lessons Learned from t
he Deployment of a Smartphone-Based Access-Contr Deployment of a Smartphone-Based Access-Control System.
54
55
Getting keys 3.6 sec 5.4 sec Stop in front of door Door
Total 14.7 sec
σ = 3.1 σ = 3.1
5.7 sec
σ = 3.6 σ = 5.6
Door Closed Door Closed 8.4 sec 2.9 sec 3.8 sec Stop in front of door Getting phone Door
Total 15.1 sec
σ = 2.8 σ = 1.5 σ = 1.1 σ = 3.9
56
57
Case Study #2
58
[Adams & Sasse 99 … we’ll talk about this later]
[Zhang et. al, CCS 2010]
59
60
p→ P
p→ P
p→ P
“password” “pa$sword”? “Password”? “pa$$word”? “Pa$sword”? “Pa$sword”? ┴
61
CATEGORY EXAMPLE
62
63
depth 1 depth 2 depth 3 depth 4 0% 10% 20% 30% 40% 50% Edit Dist Edit w/ Mov Loc Ind Pruned 26% 28% 25% 17% 39% 41% 37% 24% 41% 28% 30%
64
65
http://www.usenix.org/events/upsec08/tech/full_papers/cranor/cranor.pdf
66
Human Receiver
Intentions Motivation Attitudes and Beliefs Personal Variables Knowledge & Experience Demographics and Personal Characteristics Capabilities
Communication Behavior Communication Impediments
Interference Environmental Stimuli
Communication Processing
Comprehension
Knowledge Acquisition Application Knowledge Retention Knowledge Transfer
Communication Delivery
Attention Switch Attention Maintenance
Communication Communication Impediments
Interference Environmental Stimuli
Human Receiver
Intentions Motivation Attitudes and Beliefs Personal Variables Knowledge & Experience Demographics and Personal Characteristics Capabilities
Communication Processing
Comprehension
Knowledge Acquisition Application Knowledge Retention Knowledge Transfer
Communication Delivery
Attention Switch Attention Maintenance
Behavior
67
Task Identification Task Automation Failure Mitigation User Studies Failure Identification Human-in- the-loop Framework User Studies
Identify points where system relies on humans to perform security-critical functions Find ways to partially or fully automate some
Identify potential failure modes for remaining tasks Find ways to prevent these failures
68
Human Receiver
Intentions Motivation Attitudes and Beliefs Personal Variables Knowledge & Experience Demographics and Personal Characteristics Capabilities
Communication Behavior Communication Impediments
Interference Environmental Stimuli
Communication Processing
Comprehension
Knowledge Acquisition Application Knowledge Retention Knowledge Transfer
Communication Delivery
Attention Switch Attention Maintenance
Comprehension
69
70
Internet Explorer cookie flag
71
Task Identification Task Automation Failure Mitigation User Studies Failure Identification Human-in- the-loop Framework User Studies
Identify points where system relies on humans to perform security-critical functions Find ways to partially or fully automate some
Identify potential failure modes for remaining tasks Find ways to prevent these failures
72
73
74
75
76
77
78
79
80
81
82