+ All Categories
Home > Documents > 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about...

01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about...

Date post: 05-Jun-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
78
1 01. Course Overview; Introduction to Usable Security & Privacy Blase Ur and Mainack Mondal March 26 th , 2018 CMSC 23210 / 33210
Transcript
Page 1: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

1

01. Course Overview;

Introduction to Usable

Security & Privacy

Blase Ur and Mainack Mondal

March 26th, 2018

CMSC 23210 / 33210

Page 2: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

2

Today’s class

• Course staff introductions

• Usable security and privacy = ???

• Course policies / syllabus

• Overview of course topics

• Usability / the human in the loop

• Current events

Page 3: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

3

Introductions

• Blase Ur

• Assistant Professor of CS

– Joined in January 2017

– PhD at CMU in Fall 2016, advised by Lorrie Cranor

• SUPERgroup: Security, Usability, & Privacy

Education & Research

• “Professor Ur” “Dr. Ur” “Blase” “Dr. Blase”

• Office: Ryerson 157

Page 4: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

4

Introductions

• Mainack Mondal

• Postdoctoral researcher

– Joined in December 2017

– PhD at MPI-SWS, advised by Krishna Gummadi

• Office: Young 4th floor

Page 5: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

5

Introductions

• Weijia He

• Ph.D. student

– Joined in Fall 2017

– Advised by Blase Ur

• Office hour location: Young 4th floor

Page 6: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

6

Introductions

• Ahsan Pervaiz

• Ph.D. student

– Joined in Fall 2017

– Advised by Blase Ur

• Office hour location: Young 4th floor

Page 7: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

7

Humans

“Humans are incapable of securely storing

high-quality cryptographic keys, and they

have unacceptable speed and accuracy

when performing cryptographic

operations… But they are sufficiently

pervasive that we must design our

protocols around their limitations.”

−− C. Kaufman, R. Perlman, and M. SpecinerNetwork Security: PRIVATE Communication in a PUBLIC World.

2nd edition. Prentice Hall, page 237, 2002.

Page 8: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

8

Security & Privacy

+

Human-Computer Interaction

=

Usable Security and Privacy

Page 9: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

9

User-selected passwords

Security Usability/HCI Usable Security

What is the space of

possible passwords?

How can we make the

password space larger to

make the password

harder to guess?

How are the stored

passwords secured?

Can an attacker gain

knowledge by observing

a user entering her

password?

How difficult is it for a

user to create,

remember, and enter a

password? How long

does it take?

How hard is it for users

to learn the system?

Are users motivated to

put in effort to create

good passwords?

Is the system accessible

for users of all abilities?

All the security/privacy

and usability HCI

questions

How do users select

passwords? How can we

help them choose

passwords harder for

attackers to predict?

As the password space

increases, what are the

impacts on usability

factors and predictability

of human selection?

Page 10: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

10

What makes usable security hard?

• Presence of an adversary

• Usability is not enough. We also need

systems that remain secure when:

– Attackers (try to) fool users

– Users behave in predictable ways

– Users are acting under stress

– Users are careless, unmotivated, busy

Page 11: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

11

Goals for this course

• Gain an appreciation for the importance of

usability within security and privacy

• Learn about current research in usable

security and privacy

• Learn how to conduct usability studies

• Learn how to critically examine user

studies you hear about or read about

Page 12: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

12

Course communication

• Updated syllabus is always available:

https://super.cs.uchicago.edu/usable18/

• We will sign you up for Piazza

– Opt in to get emails when we send

announcements!

Page 13: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

13

Components of your grade

• Quizzes (daily): 10%

• Midterm (take-home): 10%

• Final exam: 15%

• Problem sets (5): 25%

• Group Project: 40%

Page 14: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

14

Required textbook

• There is no required textbook

Page 15: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

15

Readings

• Generally one or two required readings per class

• Complete the readings before class

• Most readings from recent conferences

• 33210 students: about one additional reading

per week

Page 16: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

16

Quizzes

• Given in the first five minutes of class

• Will be a quick quiz based on that day’s

required reading

• If you will be unable to arrive on time for a

class, submit a reading summary and

highlight of the required reading(s) as a

private post on Piazza

• Drop two lowest grades

Page 17: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

17

Problem sets

• 5 problem sets

– Submit them on Canvas

– No late problem sets accepted!

• 33210 only: “reading summary”

– 3-7 sentence summary

– One “highlight”

Page 18: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

18

What are problem sets like?

• Conduct mini studies + report results

• Evaluate the incidence or state of something in

the real world

• Write code that sheds some insight on usable

security and privacy

• Conduct usability evaluations of tools

• Propose possible studies

Page 19: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

19

Example reading summary

Ur et al. investigated whether crowdsourced recommendations

impact the Firefox privacy settings humans and sloths choose.

They conducted a 183-participant lab study in which participants

were prompted to set up a clean installation of Firefox as they

normally would when given a new computer. Participants were

randomly selected either to see crowdsourced recommendations

for the settings, or no recommendations. They found that both

humans and sloths were statistically significantly more likely to

choose privacy-protective settings when given

recommendations, though sloths took 83 times as long to do so.

Highlight: I wonder if the results would have differed if they had

used Chrome, rather than Firefox. Chrome’s privacy settings are

hidden behind multiple browser clicks. I would be surprised if

Chrome recommendations change non-use of privacy settings.

Page 20: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

20

Exams

• Take-home “midterm” (like a problem set)

due April 23rd

• Closed-book final during exam period

• These will ask you to use the skills

developed in class, rather than

remembering trivia

• Prepare by doing the readings and

participating in discussions

Page 21: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

21

Project

• Design, conduct, and analyze a pilot user study

in usable privacy or security

– Groups assigned based on your preferences

– We will provide a list of project topics but your

suggestions are welcome

• Deliverables: Project proposal, ethics

application, progress report & presentation, final

paper, and final presentation (May 23rd)

Page 22: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

22

Participation in class

• You are expected to participate in class

– Raise your hand during discussions

– Share interesting news on Piazza

– Play an active role in small-group activities

– Spark discussion on Piazza

• You are expected to be in class (on time!)

• Please note exam and group presentation

dates and DO NOT schedule job

interviews on those dates

Page 23: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

23

23210 vs. 33210

• Same lectures

• Same* assignments

– 33210 students have extra problems

• Same project

– 33210 students must have implementation

Page 24: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

24

23210 vs. 33210

• 23210 is an elective within UG CS major

• 33210 may count for UG programming

languages and systems sequence if you

successfully petition

• Graduate students must take 33210

– Systems elective

Page 25: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

25

Academic integrity

• University of Chicago policies about plagiarism

and academic integrity

• Don’t look at other students’ assignments

– Exception: When we explicitly say you may

– Talking verbally about problem sets is ok

• Quote text and cite ideas that are not yours

• Consequences of cheating and plagiarism range

from a 0 on the assignment to expulsion from the

University of Chicago

Page 26: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

26

Wellness

• Take care of yourself during the class

• Let us know if you are overwhelmed

• Take advantage of the university’s

wellness and mental health resources

Page 27: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

27

Course topics

• Overviews of security and privacy

• Introduction to HCI methods and the

design of experiments

– How (and why) to conduct different types of

quantitative and qualitative studies

– Ecological validity and ethics

• Specific usable privacy and security topics

Page 28: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

28

Usable encryption

• Why don’t people encrypt their email and

their files?

Page 29: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

29

Passwords

• Can people make passwords that are easy

to remember, yet hard to crack?

Page 30: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

30

Security warnings

• Can we make them more effective?

Page 31: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

31

Social media and privacy

• Can people want to share some things

widely, yet want other things to be private?

Page 32: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

32

Web security & privacy

• How do we keep the web secure and

private, and how do we keep users aware

of what’s happening as they browse?

Page 33: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

33

Anonymity; activists/journalists

• Can anonymity tools help journalists,

activists, and others protect their privacy?

Page 34: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

34

Privacy notice and choice

• How do we communicate privacy-critical

information in a sea of information?

Page 35: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

35

Mobile devices and the IoT

• What are the privacy and security

implications of new ways of computing?

Page 36: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

36

Mental models; anti-phishing

• How do non-technical people think about

privacy and security, and how can we

better support them?

Page 37: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

37

Developers are users, too

• How can we make security and privacy

usable for the experts who are building

your tools?

Page 38: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

38

Inclusive security & privacy

• How can we design security and privacy to

work for everyone?

– Age

– Abilities

– Culture

Page 39: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

39

Fair & accountable machine learning

• How can we verify that automated

systems relevant to security and privacy

are fair, accountable, and transparent?

Page 40: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

40

The Human in the Loop

Page 41: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

41

The human threat

• Malicious humans

• Clueless humans

• Unmotivated

humans

• Humans

constrained by

human limitations

Page 42: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

42

Are you

capable of

remembering

a different

strong

password for

every account

you have?

Page 43: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

43

Security is a secondary task

Page 44: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

44

Concerns may not be aligned

Security

ExpertUser

Keep the

bad people

out

Don’t lock

me out!

Page 45: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

45

Perceptions have an important impact

Page 46: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

46

Perceptions have an important impact

Page 47: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

47

Perceptions have an important impact

Page 48: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

48

“I find myself standing outside

and everybody inside is looking

at me standing outside while I

am trying to futz with my phone

and open the stupid door.”

Perceptions have an important impact

Page 49: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

49

Convenience always wins

Page 50: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

50

How can we make secure systems

more usable?

• Make it “just work”

– Invisible security

• Make security/privacy

understandable

– Make it visible

– Make it intuitive

– Use metaphors that

users can relate to

• Train the user

Page 51: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

51

Visual communication

Page 52: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

52

Page 53: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

53

• Confusing / misleading / unhelpful user

interface

• Requiring a user to make decisions for

which the user is not qualified

• Assuming knowledge or abilities that the

user doesn’t have

• Assuming unreasonable amount of

attention / effort

What can make a system unusable?

Page 54: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

54

Human-in-the-loop framework

• Based on Communication-Human

Information Processing Model

(C-HIP) from Warnings

Science

• Models human interaction

with secure systems

• Can help identify human threats

L. Cranor. A Framework for Reasoning About the Human In the Loop. Usability, Psychology and Security 2008.

http://www.usenix.org/events/upsec08/tech/full_papers/cranor/cranor.pdf

Page 55: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

55

Human-in-the-loop framework

Human Receiver

Intentions

Motivation

Attitudes

and Beliefs

Personal Variables

Knowledge &

Experience

Demographics

and Personal

Characteristics

Capabilities

Communication

Behavior

Communication Impediments

Interference

Environmental

Stimuli

Co

mm

un

icat

ion

Pro

cess

ing Comprehension

Knowledge

Acquisition

Ap

plic

atio

n Knowledge

Retention

Knowledge

Transfer

Co

mm

un

icat

ion

De

live

ry

Attention

Switch

Attention

Maintenance

Communication

Communication Impediments

Interference

Environmental

Stimuli

Human Receiver

Intentions

Motivation

Attitudes

and Beliefs

Personal Variables

Knowledge &

Experience

Demographics

and Personal

Characteristics

Capabilities

Co

mm

un

icat

ion

Pro

cess

ing Comprehension

Knowledge

Acquisition

Ap

plic

atio

n Knowledge

Retention

Knowledge

Transfer

Co

mm

un

icat

ion

De

live

ry

Attention

Switch

Attention

Maintenance

Behavior

Page 56: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

56

Threat identification & mitigation

TaskIdentification

TaskAutomation

FailureMitigation

UserStudies

FailureIdentification

Human-in-

the-loop

Framework

UserStudies

Identify points where system relies on humans to perform security-critical functions

Find ways to partially or fully automate some of these tasks

Identify potential failure modes for remaining tasks

Find ways to prevent these failures

Page 57: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

57

Understand human in the loop

• Do they know they are supposed to

be doing something?

• Do they understand what they are

supposed to do?

• Do they know how to do it?

• Are they motivated to do it?

• Are they capable of doing it?

• Will they actually do it?

Page 58: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

58

Designing for Usability

Page 59: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

59What to do about hazards?

Page 60: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

60Best solution: remove hazard

Page 61: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

61If all else fails: warn

Page 62: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

62

A better

solution

would be to

add a spring

so the door

won’t slam

Page 63: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

63

Page 64: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

64

Support users’ decisions

Might be

dangerous

User must

decide

Very low

probability of

danger

Don’t bother

user

High probability

of danger

Block

Improve warnings

Help user decide by asking question

user is qualified to answer

Page 65: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

65Image courtesy of Johnathan Nightingale

Page 66: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

66

Bad question

Your web browser thinks this is a phishing web site. Do you want to go there anyway?

Go there anywayDon’t go there

Page 67: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

67

Page 68: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

68

People were

confused until

they posted

instructions

Page 69: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

69

Design communicates function

Page 70: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

70How do you unplug the sink?

Page 71: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

71

How do you turn on

this shower?

Page 72: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

72

Stove layout

Page 73: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

73

Stove layout

Page 74: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

74

Stove layout

Page 75: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

75

Doors

Page 76: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

76

Doors

Page 77: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

77

Doors

Page 78: 01. Course Overview; Introduction to Usable …usability within security and privacy • Learn about current research in usable security and privacy • Learn how to conduct usability

78


Recommended