05-436 / 05-836 / 08-534 / 08-734 Usable Privacy and Security

Spring 2014: GHC 4102, Tuesdays and Thursdays 3:00pm-4:20pm
Class web site: http://cups.cs.cmu.edu/courses/ups-sp14/
Class mailing list: https://mailman.srv.cs.cmu.edu/mailman/listinfo/ups-class

Professor: Lorrie Cranor
Email: lorrie AT cmu DOT edu
Web: http://lorrie.cranor.org/
Phone: 412-268-7534
Office: CIC 2207
Office hours: Wednesdays 3:00pm - 4:00pm and by appointment

Teaching assistant: Blase Ur
Email: blase AT blaseur DOT com
Web: http://www.blaseur.com/
Phone: --
Office: CIC 2222 (cubicles)
Office hours: Tuesdays 4:30pm - 5:30pm and by appointment

Students in this course may also be interested in joining the CUPS mailing list.

This course does not use Blackboard.

Course Description

There is growing recognition that technology alone will not provide all of the solutions to security and privacy problems. Human factors play an important role in these areas, and it is important for security and privacy experts to have an understanding of how people will interact with the systems they develop. This course is designed to introduce students to a variety of usability and user interface problems related to privacy and security and to give them experience in designing studies aimed at helping to evaluate usability issues in security and privacy systems. The course is suitable both for students interested in privacy and security who would like to learn more about usability, as well as for students interested in usability who would like to learn more about security and privacy. Much of the course will be taught in a graduate seminar style in which all students will be expected to do a weekly reading assignment and each week different students will prepare a presentation for the class. Students will also work on a group project throughout the semester.

The course is open to all graduate students who have technical backgrounds. The 12-unit course numbers (08-734 and 5-836) are for PhD students and masters students. Students enrolled in these course numbers will be expected to play a leadership role in a group project that produces a paper suitable for publication. The 9-unit 500-level course numbers (08-534 and 05-436) are for juniors, seniors, and masters students. Students enrolled in these course numbers will have less demanding project and presentation requirements.

Readings

Readings will be assigned from the following text (available in the CMU bookstore and from all the usual online stores):

Additional readings will be assigned from papers available online or handed out in class. In cases where a subscription is required for access, access should be available for free when you are coming from a CMU IP address (on campus or via CMU VPN).

Course Schedule

Note, this is subject to change. The class web site will have the most up-to-date version of this calendar.

Date

Topics

Assignment

To be done before coming to class

Tuesday, January 14

01. Course overview and introductions [SLIDES]

No readings for this class.

Thursday, January 16

02. Introduction to HCI methods and the design of experiments [SLIDES]

  • Usability and user interfaces
  • Design and prototyping
  • Types of experiments
  • Evaluation and types of experiments

Required reading:

No optional readings for this class.

Tuesday, January 21

03. Reasoning About the Human in the Loop (and why we should care) [SLIDES]

  • Introduction to usable security
  • Approaches to making security usable
  • Human-in-the-loop framework
  • Human threat identification and mitigation process

Required reading:

Optional reading:

Thursday, January 23

04. Designing field studies that are ethical and ecologically valid, Mechanical Turk [SLIDES]

  • Experimental design process
  • IRB process

Homework 1 due

Required reading:

Optional reading:

Tuesday, January 28

05. Surveys, interviews, focus groups, diary studies [SLIDES]

Required reading:

Optional reading:

Thursday, January 30

06. Quantitative studies, statistics [SLIDES]

Homework 2 due

Required reading:

Optional reading:

Tuesday, February 4

07. Introduction to security [SLIDES]

Discuss course projects in class (no written assignment)

Required reading:

  • Students without a strong security background should read both chapters labeled [Introductory] below. Students with a strong security background (e.g., have taken 700-level security courses at CMU or equivalent) should read two of the papers labeled [Advanced] below.

Optional reading:

Thursday, February 6

08. Introduction to privacy [SLIDES]

  • Defining privacy
  • Online privacy issues
  • Privacy by design

Homework 3 due

Project preference forms also due

Required reading:

Optional reading:

Tuesday, February 11

09. Passwords [SLIDES]

Project teams assigned (no written assignment)

Required reading:

Optional reading:

Thursday, February 13

10. Challenge questions and secondary authentication [Student presentation by Shing-hon Lau] [SLIDES]

Homework 4 due

Required reading:

Optional reading:

Tuesday, February 18

11. Censorship, politics, and anonymity [Student presentation by Weisi Dai and Abby Marsh] [SLIDES]

Project proposal due

Required reading:

Optional reading:

Thursday, February 20

12. Usable privacy and security in the home [Student presentation by Ashutosh Pandey] [SLIDES]

Homework 5 due

Required reading:

Optional reading:

Tuesday, February 25

13. Security warnings [Student presentation by Darya Kurilova] [SLIDES]

Required reading:

Optional reading:

Thursday, February 27

14. Usable encryption [Student presentation by Sean Segreti] [SLIDES]

Homework 6 due

Required reading:

Optional reading:

Tuesday, March 4

15. Smartphones, privacy, security [Student presentation by Sakshi Garg and Bin Liu] [SLIDES]

IRB applications must be submitted to the IRB no later than this date

Required reading:

Optional reading:

Thursday, March 6

16. Privacy notice and privacy policies [Student presentation by Yuan Tian] [SLIDES]

Homework 7 due

Required reading:

Optional reading:

Tuesday, March 11

no class (Spring break)

No readings for this class.

Thursday, March 13

no class (Spring break)

No readings for this class.

Tuesday, March 18

17. Biometrics [Student presentation by Chandrasekhar Bhagavatula and Stephen Siena] [SLIDES]

Required reading:

Optional reading:

Thursday, March 20

18. SSL, PKIs, secure communication [Student presentation by Aditya Marella] [SLIDES]

Homework 8 due

Required reading:

Optional reading:

Tuesday, March 25

19. Progress report presentations

Project progress report due

Required reading:

Thursday, March 27

20. Progress report presentations

No readings for this class.

Tuesday, April 1

21. Social networks and privacy [Student presentation by Su Mon Kywe and Tatiana Vlahovic] [SLIDES]

Required reading:

Optional reading:

Thursday, April 3

22. Trust, mental models, semantic attacks, social engineering, and user education [Student presentation by Jie Chen] [SLIDES]

Homework 9 due

Required reading:

Optional reading:

Tuesday, April 8

23. Usable privacy and security in safety-critical devices [Student presentation by Adam Durity and Frankie Catota] [SLIDES]

Required reading:

Optional reading:

Thursday, April 10

no class (Carnival)

No readings for this class.

Tuesday, April 15

24. Access control and policy configuration, tools for security administration [Student presentation by Ziwei Hu and Norman Wu] [SLIDES]

Required reading:

Optional reading:

Thursday, April 17

25. Economics and behavior as part of usability [Student presentation by Pranshu Kalvani]

Homework 10 due

Required reading:

Optional reading:

Tuesday, April 22

26. Web browser privacy and security [Student presentation by Billy Melicher and Chao Pan]

Required reading:

  • Jonathan R. Mayer and John C. Mitchell. Third-Party Web Tracking: Policy and Technology. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013. (S&P '13 / Oakland '13)
  • Rachna Dhamija, J. D. Tygar, and Marti Hearst. Why Phishing Works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2006. (CHI '06)

Optional reading:

Thursday, April 24

27. Graphical passwords [Student presentation by Zhipeng Tian]

Homework 11 due

Required reading:

Optional reading:

Tuesday, April 29

no class (CHI)

No readings for this class.

Thursday, May 1

no class (CHI)

No readings for this class.

Monday, May 5

FINAL PROJECT PRESENTATIONS from 8:30 AM to 11:30 AM

---

This class will have no final exam. However, the final exam period (Monday, May 5th, 8:30 AM to 11:30 AM) will be used for final project presentations.

Course Requirements and Grading

You are responsible for being familiar with the university standard for academic honesty and plagiarism. Please see the CMU Student Handbook for information. In order to deter and detect plagiarism, online tools and other resources may be used in this class. Students caught cheating or plagiarizing will receive no credit for the assignment on which the cheating occurred. Additional actions -- including assigning the student a failing grade in the class or referring the case for disciplinary action -- may be taken at the discretion of the instructors.

For students taking the 12-unit version of this course, your final grade in this course will be based on:

For students taking the 9-unit version of this course, your final grade in this course will be based on:

Homework

Homework assignments for this class will include reading summaries and written assignments. All homework is due in printed form in class at 3:00 PM each Thursday, unless specified otherwise. Homework may not be submitted after 3:05 pm, and we do not accept late homework. Your lowest homework grade will be dropped from your homework average.

Students are expected to do reading assignments prior to class so that they can participate fully in class discussions. Students must submit a short summary (3-7 sentences) and a "highlight" for each chapter or article in the reading assignment. The highlight may be something you found particularly interesting or noteworthy, a question you would like to discuss in class, a point you disagree with, etc.

Students taking the 12-unit version of this course are expected to include a summary and highlight for one optional reading of their choice each week. Suggested optional readings are provided, but students may choose other relevant optional readings. All other students are encouraged to review some of the optional readings that they find interesting, but they need not submit summaries or highlights of the optional readings.

Presentation

Each student taking the 12-unit version of this course will be assigned a class lecture to prepare and present (either individually or in a small group). The lecture should be based on the topics covered in that week's reading assignment, but it should go beyond the materials in the required reading. Do not present a lecture that simply summarizes the assigned reading. For example, you might read and present some of the optional readings or related work mentioned in the reading or that you find on your own, you might present some of the relevant optional reading materials (feel free to use relevant materials from other weeks), you might demonstrate software mentioned in the reading, you might critique a design discussed in the reading, or you might design a class exercise for your classmates. If the material you present describes a user study, include a detailed description and critique of the study design. As part of your lecture you should prepare several discussion questions and lead a class discussion. You should also introduce your fellow students to terminology, researchers, and concepts they might not be familiar with. You are also expected to have read and be familiar with all of the optional readings for that particular class.
No later than 24 hours before your presentation, you should email the instructors PowerPoint slides that include discussion questions. These slides will be posted on the class web site. In addition, the instructors may include all or part of your presentation slides and notes in an instructor's guide for future usable privacy and security courses.

Project

Students will work on semester projects in small groups that include students with a variety of areas of expertise. A choice of projects will be provided, and students will be given an opportunity to indicate their preferences before projects are assigned. Students who have their own ideas for projects should discuss them with the instructors early in the semester. As part of the project students will:

Students are encouraged to submit their project as a poster to the 2014 Symposium On Usable Privacy and Security, and/or as a full paper to SOUPS 2015 or another conference. A paper submission will likely require some additional work after the end of the semester. To submit a poster will only require submitting a 2-page abstract. Professor Cranor will provide funds for one student from each project team to attend the SOUPS conference if their paper or poster is accepted.

Students signed up for the 12-unit version of this course are expected to play a leadership role in a project group that writes a project paper suitable for publication. Unless your group has only students signed up for the 9-unit course in it, that means your final paper should be written in a style suitable for publication at a conference or workshop. The conference papers in the readings provide good examples of what a conference paper looks like and the style in which they are written. In addition to describing what you did in your study, your paper should include a related work section and properly-formatted references. Papers should follow the SOUPS 2014 technical papers formatting instructions. However, your paper should not be a blind submission; please include the names of the authors for the purposes of the class project. If you have identified an alternative relevant conference and would prefer to use that conference's submission format for your paper, please discuss it with the instructors.