Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Fall IM 2000 Evfolution of Presence Based Networks Evolution of Presence Based Networks Jonathan Rosenberg Chief Scientist.
AmeriCorps is introducing a new online payment system for the processing of AmeriCorps forms
Advertising with Face Book Guadalupe Perez III October 12, 2010 EDTC 3332 Instructional Technology Practicum.
1 Authority on Demand Flexible Access Control Solution.
1 Unit & District Tools Phase 1. 2 To access the new Unit and District Tools, you will need to click on the link embedded in the MyScouting Flash page.
C MU U sable P rivacy and S ecurity Laboratory Anti-Phishing Phil The Design and Evaluation of a Game That Teaches People Not to.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Location Based Social Networking For All Presenter: Danny Swisher.
Fòmasyon Itilizatè Ayiti Office 365 Fòmasyon. Why the Change? Partners in Health's new hosted Microsoft Office 365 solution allows users to access their.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites Yue Zhang University of Pittsburgh Jason I. Hong, Lorrie F. Cranor Carnegie Mellon University.
User Interfaces and Algorithms for Fighting Phishing Jason I. Hong Carnegie Mellon University.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 User Studies Motivation January.
Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Faculty of Computer Science Dalhousie University whalen at cs dot dal dot.
Privacy and Ubiquitous Computing Jason I. Hong. Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you.
User Interfaces and Algorithms for Fighting Phishing Jason I. Hong Carnegie Mellon University.
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January.
Norman M. Sadeh ISR - School of Computer Science Carnegie Mellon University User-Controllable Security and Privacy.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Designing user studies February.
Usable Privacy and Security: Protecting People from Online Phishing Scams Alessandro Acquisti Lorrie Cranor Julie Downs Jason Hong Norman Sadeh Carnegie.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
User Interfaces and Algorithms for Fighting Phishing Jason I. Hong Carnegie Mellon University.
Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University.
User Interfaces and Algorithms for Fighting Phishing Jason I. Hong Carnegie Mellon University.
User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Four Two Rants on Mobile Computing Jason I. Hong Feb Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.
Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly.
Usable Privacy and Security Jason I. Hong Carnegie Mellon University.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Course Overview January 16, 2007.
» Teaching an online class, what takes up most of your time?
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
Human-Computer Interaction Breakout Clare-Marie Karat, Charles Wiecha Wanda Dunn, Jason Hong, Bonnie John, Bob Kraut, Brad Myers, Norman Sadeh.
Mobile and Location-Based Services Jason I. Hong May
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
User Interfaces and Algorithms for Fighting Phishing Jason I. Hong Carnegie Mellon University.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Reliability & Desirability of Data
Comparing the Effectiveness of Alternative Approaches for Displaying Edit-Error Messages in Web Forms Bill Mockovak Office of Survey Methods Research Bureau.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
© 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Review, revise and renew your support.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
©2010 John Wiley and Sons Chapter 6 Research Methods in Human-Computer Interaction Chapter 6- Diaries.
Prof. Jason Hong, Carnegie Mellon University Rapid End-User Programming and Visualization for the Web IDA Session CS Study Panel 24 April 2008.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Human-Computer Interaction at CMU Jodi Forlizzi Jason Hong.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
ISPAB Panel on Usable Security Mary Frances Theofanos - NIST Ellen Cram Kowalczyk - Microsoft.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
Creating & Building the Web Site Week 8. Objectives Planning web site development Initiation of the project Analysis for web site development Designing.
Usable Privacy and Security and Mobile Social Services Jason Hong
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security.
Employment Workshop - Work Basics Facilitator- C.Piggott Women’s Group.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
CALVERLEY PATIENT SURVEY FEEDBACK NOVEMBER ACCESSING YOUR APPOINTMENT Very quick and professional – One could say “Bedside Manner Excellent” On.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
The Information School of the University of Washington Information System Design Info-440 Autumn 2002 Session #20.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Teaching you NOT to fall for Phish
Course Overview January 16, 2007.
Presentation transcript:

Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University

Everyday Privacy and Security Problem

Usable Privacy and Security Important People increasingly asked to make trust judgements –Consequences of wrong decision can be dramatic New networked technologies leading to new risks –Friend Finder (“where is Alice?”) –Better awareness(“Daniel is at school”) Find FriendsinTouch

Grand Challenge “Give end-users security controls they can understand and privacy they can control for the dynamic, pervasive computing environments of the future.” - Computing Research Association 2003

Usable Privacy and Security Work Supporting Trust Decisions –Interviews to understand decision-making –Embedded training User-Controllable Privacy and Security in Pervasive Computing –Contextual instant messaging –Person Finder –Access control to resources

Project: Supporting Trust Decisions Goal here is to help people make better decisions –Context here is anti-phishing Large multi-disciplinary team project –Supported by NSF, ARO, CMU CyLab –Six faculty, five PhD students, undergrads, staff –Computer science, human-computer interaction, public policy, social and decision sciences, CERT

Phishing A semantic attack aimed directly at people rather than computers –“Please update your account” –“Fill out survey and get $25” –“Question about your auction” Rapidly growing in scale and damage –Estimated 3.5 million phishing victims –~7000 new phishing sites in Dec 2005 alone –~$1-2 billion in damages –More profitable (and safer) to phish than rob a bank

Supporting Trust Decisions Outline Human-Side of Anti-Phishing –Interviews to understand decision-making –Embedded Training –Anti-Phishing Game Computer-Side – Anti-Phishing Filter –Automated Testbed for Anti-Phishing Toolbars –Our Anti-Phishing Toolbar Automate where possible, support where necessary

What do users know about phishing?

Interview Study Interviewed 40 Internet users, included 35 non-experts “Mental models” interviews included role play and open ended questions Interviews recorded and coded J. Downs, M. Holbrook, and L. Cranor. Decision Strategies and Susceptibility to Phishing. In Proceedings of the 2006 Symposium On Usable Privacy and Security, July 2006, Pittsburgh, PA.

Little Knowledge of Phishing Only about half knew meaning of the term “phishing” “Something to do with the band Phish, I take it.”

Little Attention Paid to URLs Only 55% of participants said they had ever noticed an unexpected or strange-looking URL Most did not consider them to be suspicious

Some Knowledge of Scams 55% of participants reported being cautious when asks for sensitive financial info –But very few reported being suspicious of asking for passwords Knowledge of financial phish reduced likelihood of falling for these scams –But did not transfer to other scams, such as amazon.com password phish

Naive Evaluation Strategies The most frequent strategies don’t help much in identifying phish –This appears to be for me –It’s normal to hear from companies you do business with –Reputable companies will send s “I will probably give them the information that they asked for. And I would assume that I had already given them that information at some point so I will feel comfortable giving it to them again.”

Other Findings Web security pop-ups are confusing “Yeah, like the certificate has expired. I don’t actually know what that means.” Minimal knowledge of lock icon Don’t know what encryption means Summary –People generally not good at identifying scams they haven’t specifically seen before –People don’t use good strategies to protect themselves

Can we train people not to fall for phishing?

Web Site Training Study Laboratory study of 28 non-expert computer users Two conditions, both asked to evaluate 20 web sites –Control group evaluated 10 web sites, took 15 minute break to read or play solitaire, evaluated 10 more web sites –Experimental group same as above, but spent 15 minute break reading web-based training materials Experimental group performed significantly better identifying phish after training –Less reliance on “professional-looking” designs –Looking at and understanding URLs –Web site asks for too much information People can learn from web-based training materials, if only we could get them to read them!

How Do We Get People Trained? Most people don’t proactively look for training materials on the web Many companies send “security notice” s to their employees and/or customers But these tend to be ignored –Too much to read –People don’t consider them relevant –People think they already know how to protect themselves

Embedded Training Can we “train” people during their normal use of to avoid phishing attacks? –Periodically, people get sent a training –Training looks like a phishing attack –If person falls for it, intervention warns and highlights what cues to look for in succinct and engaging format P. Kumaraguru, Y. Rhee, A. Acquisti, L. Cranor, J. Hong, and E. Nunge. Protecting People from Phishing: The Design and Evaluation of an Embedded Training System. CyLab Technical Report. CMU-CyLab , [to be presented at CHI 2007]

Diagram Intervention

Explains why they are seeing this message

Diagram Intervention Explains how to identify a phishing scam

Diagram Intervention Explains what a phishing scam is

Diagram Intervention Explains simple things you can do to protect self

Comic Strip Intervention

Embedded Training Evaluation Lab study comparing our prototypes to standard security notices –EBay, PayPal notices –Diagram that explains phishing –Comic strip that tells a story 10 participants in each condition (30 total) Roughly, go through 19 s, 4 phishing attacks scattered throughout, 2 training s too – s are in context of working in an office

Embedded Training Results Existing practice of security notices is ineffective Diagram intervention somewhat better Comic strip intervention worked best –Statistically significant

Next Steps Iterate on intervention design –Have already created newer designs, ready for testing Understand why comic strip worked better –Story? Comic format? Preparing for larger scale deployment –Include more people –Evaluate retention over time –Deploy outside lab conditions if possible Real world deployment and evaluation –Need corporate partners to let us spoof their brand

Usable Privacy and Security Work Supporting Trust Decisions –Interviews to understand decision-making –Embedded training User-Controllable Privacy and Security in Pervasive Computing –Contextual instant messaging –Person Finder –Access control to resources

The Problem Mobile devices becoming integrated into everyday life –Mobile communication –Sharing location information with others –Remote access to home –Mobile e-commerce Managing security and privacy policies is hard –Preferences hard to articulate –Policies hard to specify –Limited input and output Leads to new sources of vulnerability and frustration

Our Goal Develop better UIs for managing privacy and security on mobile devices –Simple ways of specifying policies –Clear notifications and explanations of what happened –Better visualizations to summarize results –Machine learning for learning preferences –Start with small evaluations, continue with large-scale ones Large multi-disciplinary team and project –Six faculty, 1.5 postdocs, six students –Roughly 1 year into project

Usable Privacy and Security Work Supporting Trust Decisions –Interviews to understand decision-making –Embedded training User-Controllable Privacy and Security in Pervasive Computing –Contextual instant messaging –Person Finder –Access control to resources

Contextual Instant Messaging Facilitate coordination and communication by letting people request contextual information via IM –Interruptibility (via SUBTLE toolkit) –Location (via Place Lab wifi positioning) –Active window Developed a custom client and robot on top of AIM –Client (Trillian plugin) captures and sends context to robot –People can query imbuddy411 robot for info “howbusyis username” –Robot also contains privacy rules governing disclosure

Contextual Instant Messaging Privacy Mechanisms Web-based specification of privacy preferences –Users can create groups and put screennames into groups –Users can specify what each group can see

Contextual Instant Messaging Privacy Mechanisms Notifications of requests

Contextual Instant Messaging Privacy Mechanisms Social translucency

Contextual Instant Messaging Privacy Mechanisms Audit logs

Contextual Instant Messaging Evaluation Recruited ten people for two weeks –Selected people highly active in IM (ie undergrads ) –Each participant had ~90 buddies and 1300 incoming and outgoing messages per week Notified other parties of imbuddy411 service –Update AIM profile to advertise –Would notify other parties at start of conversation

Contextual Instant Messaging Results Total of 242 requests for contextual information –53 distinct screen names, 13 repeat users

Contextual Instant Messaging Results 43 privacy groups, ~4 per participant –Groups organized as class, major, clubs, gender, work, location, ethnicity, family –6 groups revealed no information –7 groups disclosed all information Only two instances of changes to rules –In both cases, friend asked participant to increase level of disclosure

Contextual Instant Messaging Results Likert scale survey at end –1 is strongly disagree, 5 is strongly agree –All participants agreed contextual information sensitive Interruptibility 3.6, location 4.1, window 4.9 –Participants were comfortable using our controls (4.1) –Easy to understand (4.4) and modify (4.2) –Good sense of who had seen what (3.9) Participants also suggested improvements –Notification of offline requests –Better notifications to reduce interruptions (abnormal use) –Better summaries (“User x asked for location 5 times today”)

Contextual Instant Messaging Current Status Preparing for another round of deployment –Larger group of people –A few more kinds of contextual information Developing privacy controls that scale better –More people, more kinds of information

Usable Privacy and Security Work Supporting Trust Decisions –Interviews to understand decision-making –Embedded training User-Controllable Privacy and Security in Pervasive Computing –Contextual instant messaging –Person Finder –Access control to resources

People Finder Location useful for micro-coordination –Meeting up –Okayness checking Developed phone-based client –GSM localization (Intel) Conducted studies to see how people specify rules (& how well) See how well machine learning can learn preferences

People Finder Machine Learning Using case-based reasoning (CBR) –“My colleagues can only see my location on weekdays and only between 8am and 6pm” –It’s now 6:15pm, so the CBR might allow, or interactively ask Chose CBR over other machine learning –Better dialogs with users (ie more understandable) –Can be done interactively (rather than accumulating large corpus and doing post-hoc)

People Finder Study on Preferences and Rules How well people could specify rules, and if machine learning could do better –13 participants (+1 for pilot study) –Specify rules at beginning of study –Presented a series of thirty scenarios –Shown what their rules would do, asked if correct and utility –Given option to change rule if desired

People Finder Study on Rules

People Finder Results – User Burden Mean (sec) Std dev (sec) Rule Creation Rule Maintenance Total

People Finder Results – Accuracy

People Finder Current Conclusions Roughly 5 rules per participant Users not good at specifying rules –Time consuming & low accuracy (61%) even when they can refine their rules over time (67%) –Interesting contrast with imbuddy411, where people were comfortable Possible our scenarios biased towards exceptions CBR seems better in terms of accuracy and burden Additional experiments still needed

People Finder Current Work Small-scale deployment of phone-based People Finder with a group of friends –Still needs more value, people finder by itself not sufficient –Trying to understand pain points on next iteration Need more accurate location –GSM localization accuracy haphazard Integration with imbuddy411 –Smart phones expensive, IM vastly increases user base

Usable Privacy and Security Work Supporting Trust Decisions –Interviews to understand decision-making –Embedded training User-Controllable Privacy and Security in Pervasive Computing –Contextual instant messaging –Person Finder –Access control to resources

Grey – Access Control to Resources Distributed smartphone-based access control system –physical resources like office doors, computers, and coke machines –electronic ones like computer accounts and electronic files –currently only physical doors Proofs assembled from credentials –No central access control list –End-users can create flexible policies

Grey Creating Policies Proactive policies –Manually create a policy beforehand –“Alice can always enter my office” Reactive policies –Create a policy based on a request –“Can I get into your office?” –Grey sees who is responsible for resource, and forwards Might select from multiple people (owner, secretary, etc) –Can add the user, add time limits too

Grey Deployment at CMU 25 participants (9 part of the Grey team) Floor plan with Grey-enabled Bluetooth doors

Grey Evaluation Monitored Grey usage over several months Interviews with each participant every 4-8 weeks Time on task in using a shared kitchen door

Grey Results of Time on Task of a Shared Kitchen Door

Grey Surprises Grey policies did not mirror physical keys –Grey more flexible and easier to change Lots of non-research obstacles –user perception that the system was slow –system failures causing users to get locked out –need network effects to study some interesting issues Security is about unauthorized users out, our users more concerned with how easy for them to get in –never mentioned security concerns when interviewed

Grey Current work Iterating on the user interfaces –More wizard-based UIs for less-used features Adding more resources to control Visualizations of accesses –Relates to abnormal situations noted in contextual IM

Grey Current work in Visualizations

Some Early Lessons Many indirect issues in studying usable privacy and security (value proposition, network effects) People seem willing to use apps if good enough control and feedback for privacy and security Lots of iterative design needed

Conclusions Supporting Trust Decisions –Interviews to understand decision-making –Embedded training User-Controllable Privacy and Security in Pervasive Computing –Contextual instant messaging –Person Finder –Access control to resources

Questions? Alessandro Acquisti Lorrie Cranor Sven Dietrich Julie Downs Mandy Holbrook Jason Hong Jinghai Rao Norman Sadeh NSF CNS NSF IIS ARO D20D Cylab Jason Cornwell Serge Egelman Ian Fette Gary Hsieh P. Kumaraguru (PK) Madhu Prabaker Yong Rhee Steve Sheng Karen Tang Kami Vaniea Yue Zhang

People Finder Results – Accuracy

Difficult to Build Usable Interfaces (a)(c)

People Finder Study on Preferences and Rules First conducted informal studies to understand factors important for location disclosures –Asked people to describe in natural language –Social relation, time, location –“My colleagues can only see my location on weekdays and only between 8am and 6pm”

Future Privacy and Security Problem You think you are in one context, actually overlapped in many others Without this understanding, cannot act appropriately

Anti-Phishing Phil A game to teach people not to fall for phish –Embedded training focuses on –Game focuses on web browser, URLs Goals –How to parse URLs –Where to look for URLs –Use search engines instead Available on our web site soon

Anti-Phishing Phil