1
Usable security and the human in the loop
Michelle Mazurek
Some slides adapted from Lujo Bauer, Lorrie Cranor, Rob Reeder, Blase Ur, and Yinqian Zhang
Usable security and the human in the loop Michelle Mazurek Some - - PowerPoint PPT Presentation
Usable security and the human in the loop Michelle Mazurek Some slides adapted from Lujo Bauer, Lorrie Cranor, Rob Reeder, Blase Ur, and Yinqian Zhang 1 The human threat Malicious humans Humans who dont know what to do
1
Some slides adapted from Lujo Bauer, Lorrie Cranor, Rob Reeder, Blase Ur, and Yinqian Zhang
2
3
4
5
6
7
8
9
Case study #1:
10
A User Study of Policy icy Cr Creat eation in a Flexible Access-Contr ion in a Flexible Access-Control System.
Lessons Learned from t
he Deployment of a Smartphone-Based Access-Contr Deployment of a Smartphone-Based Access-Control System.
11
12
Getting keys 3.6 sec 5.4 sec Stop in front of door Door
Total 14.7 sec
σ = 3.1 σ = 3.1
5.7 sec
σ = 3.6 σ = 5.6
Door Closed Door Closed 8.4 sec 2.9 sec 3.8 sec Stop in front of door Getting phone Door
Total 15.1 sec
σ = 2.8 σ = 1.5 σ = 1.1 σ = 3.9
13
14
Case Study #2
15
[Adams & Sasse 99 … we’ll talk about this later]
[Zhang et. al, CCS 2010]
16
17
p→ P
p→ P
p→ P
“password” “pa$sword”? “Password”? “pa$$word”? “Pa$sword”? “Pa$sword”? ┴
18
CATEGORY EXAMPLE
19
20
depth 1 depth 2 depth 3 depth 4 0% 10% 20% 30% 40% 50% Edit Dist Edit w/ Mov Loc Ind Pruned 26% 28% 25% 17% 39% 41% 37% 24% 41% 28% 30%
21
22
http://www.usenix.org/events/upsec08/tech/full_papers/cranor/cranor.pdf
23
Human Receiver
Intentions Motivation Attitudes and Beliefs Personal Variables Knowledge & Experience Demographics and Personal Characteristics Capabilities
Communication Behavior Communication Impediments
Interference Environmental Stimuli
Communication Processing
Comprehension
Knowledge Acquisition Application Knowledge Retention Knowledge Transfer
Communication Delivery
Attention Switch Attention Maintenance
Communication Communication Impediments
Interference Environmental Stimuli
Human Receiver
Intentions Motivation Attitudes and Beliefs Personal Variables Knowledge & Experience Demographics and Personal Characteristics Capabilities
Communication Processing
Comprehension
Knowledge Acquisition Application Knowledge Retention Knowledge Transfer
Communication Delivery
Attention Switch Attention Maintenance
Behavior
24
Task Identification Task Automation Failure Mitigation User Studies Failure Identification Human-in- the-loop Framework User Studies
Identify points where system relies on humans to perform security-critical functions Find ways to partially or fully automate some
Identify potential failure modes for remaining tasks Find ways to prevent these failures
25
Human Receiver
Intentions Motivation Attitudes and Beliefs Personal Variables Knowledge & Experience Demographics and Personal Characteristics Capabilities
Communication Behavior Communication Impediments
Interference Environmental Stimuli
Communication Processing
Comprehension
Knowledge Acquisition Application Knowledge Retention Knowledge Transfer
Communication Delivery
Attention Switch Attention Maintenance
Comprehension
26
27
Internet Explorer cookie flag
28
Task Identification Task Automation Failure Mitigation User Studies Failure Identification Human-in- the-loop Framework User Studies
Identify points where system relies on humans to perform security-critical functions Find ways to partially or fully automate some
Identify potential failure modes for remaining tasks Find ways to prevent these failures
29
30
31
32
33
34
35
36
37
38