SOUPS 2006

July 12-14, 2006
Pittsburgh, PA

Symposium On Usable Privacy and Security

PROGRAM

Wednesday, July 12

8 - 9 am: Breakfast and registration (Newell-Simon Hall Room 3305)

9am - 3:45 pm: Security User Studies Workshop (Newell-Simon Hall Room 3305)

The Security User Studies workshop will focus on the design, implementation and challenges of conducting Security User Studies. The workshop will be an opportunity for researchers to share experiences, materials, and ideas, and for newcomers to learn about problems and best practices. Workshop registration is included in the SOUPS registration fee.

Some of the workshop speakers have made available user study construction kits.

  • 9:00 - 9:10 am: Welcome
  • 9:10 - 10:00 am: Invited talk
    • Max Caceres, "Exploiting Usability: Client Side Penetration Testing"
  • 10:00 - 10:40 am: User studies about Web Browsing
    • Tara Whalen, "Use of Visual Security Cues in Web Browsing"
    • Min Wu, "Web Wallet"
  • 10:40 - 11:00 am: Break
  • 11:00 - 12:00 am: User studies about Passwords
    • Richard Conlan, "Interface Designs to Help Users Choose Better Passwords" [web site]
    • Sonia Chiasson, "Password Managers"
    • Shirley Gaw, "Password Management Strategies for Online Accounts"
  • 12:00 - 1:00 pm: Lunch
  • 1:00 - 1:50 pm: Invited talk
    • Bezalel Gavish, "Trust and Swindling on the Internet"
  • 1:50 - 2:30 pm: User studies about Email
    • Mary Ellen Zurko, "Notes Execution Control List (ECL)"
    • Simson Garfinkel, "Johnny 2"
  • 2:30 - 2:45 pm: Break
  • 2:45 - 3:45 pm: User study proposals and research agenda

4 - 6 pm: Poster session and reception (Newell-Simon Hall Atrium)

Thursday, July 13

Thursday's and Friday's events will be held in the Distributed Education Center (DEC) on the L level of the Carnegie Mellon Collaborative Innovation Center (CIC), unless otherwise noted. Lunches will be held in Newell-Simon Hall room 3305.

8 - 9 am: Breakfast and registration

9 am - 10:15 am: Opening session

10:15 - 10:45 am: Break

10:45 am - 12:15 pm: Technical paper session: Intelligible Access Control, Chair: Andrew Patrick

12:15 - 1:15 pm: Lunch (Newell-Simon Hall Room 3305)

1:15 - 3:15 pm: Technical paper session: Password Management, Mnemonics, and Mother's Maiden Names, Chair: Bill Cheswick

3:15 - 3:45 pm: Break

3:45 - 5 pm: Panel - Phishing - How will the scourge really be killed?

5 - 5:15 pm: Presentation of Tor GUI Competition awards

6 - 9 pm: Dinner at the Carnegie Museum of Natural History (walking distance from CMU and Holiday Inn)

Friday, July 14

8 - 9 am: Breakfast and registration

9 - 10:30 am: Technical paper session: Catching Phish, Chair: Jason Hong

10:30 - 10:45 am: Break and move to discussion session rooms

10:45 am - noon: Discussion Sessions (CIC 1305, CIC 2101, CIC 2201, CIC DEC)

Noon - 1 pm: Lunch (Newell-Simon Hall Room 3305)

1 - 3pm: Technical paper session: Risk Transparency, Chair: Diana Smetters

3 - 3:30 pm: Closing session

3:30 pm: Ice cream social

INVITED TALK

Shortcuts, Habits and Sand Castles

Austin Hill, co-founder of Radialpoint, will share his insights on usable security from a corporate perspective. He'll touch on where security and usability intersected (often badly) in the past and why the future of computer security relies on rethinking user interaction points. In contrast, the usable security issues encountered in actual live deployments drive and justify commercial investment in understanding and fixing them. He'll focus on the large impact and common problems that have driven work at Radialpoint in that area.

Austin Hill headshotAustin Hill is co-founder of Radialpoint and acted as its President from 1997 to 2001. He was previously the co-founder of TotalNet, one of Canada's most successful Internet Service Providers, where he built and maintained a national IP network and billing and support system. Prior to TotalNet, he created Cyberspace Data Security, an early network security consulting firm. An avid technologist and passionate speaker, Austin is a leading lecturer and presenter on security and privacy issues. He has spoken at COMDEX, the International Conference on Privacy and Personal Data Protection, and the Davos World Economic Forum, where he was named a Technology Pioneer (2001). Austin also represented Canadian technology firms with Industry Canada at the G8 summit on International Cybercrime, and has presented to the Federal Trade Commission, the FCC, the US Department of Homeland Security's Data Integrity and Privacy Advisory Committee, and the Federal Bureau of Investigation and Communication Security Association (Canada).

PANEL

Phishing - How will the scourge really be killed?

There's a lot of discussion about phishing right now. The nub of controversy that can best be attacked at SOUPS is the question of, in general, what approach or approaches should we invest our time, skill, and money on to stop or blunt phishing attacks (and any other attacks that use distributed technology like the web and email to extract personally and financially valuable information from people, with their explicit interaction).

Panelists will argue that one of the following is the "one true way":

  1. User control of what is trustworthy through the browser (toolbars, personal history with sites)
  2. Central authorities will vet and relate what sites are trustworthy, through a PKI and/or OS
  3. Sites and applications will make changes that protect personal information and authenticate their pre existing relationship with the user, or take the burden off of the user entirely
  4. Users will become more security technology saavy; they have before as needed, and will again, and existing mechanisms will be sufficiently useful with modest enhancements

Panelists:

  • Mary Ellen Zurko, IBM Software Group (Moderator)
  • Rob Franco, Microsoft, Internet Explorer
  • Jeff Nelson, Google Accounts
  • Ka-Ping Yee, UC Berkeley Computer Science
  • Diana Smetters, PARC

POSTERS

ANALYTICAL TOOLS FOR PRIVACY RISKS: ASSESSING EFFICACY ON VOTE VERIFICATION TECHNOLOGIES
Rosa R. Heckle and Stephen H. Holden (UMBC)

CATEGORIZING RFID PRIVACY THREATS WITH STRIDE
Dale R. Thompson, Jia Di, Harshitha Sunkara, and Craig Thompson (University of Arkansas)

CONTEXT SENSITIVE PASSWORD
Anthony Y. Fu, Robert C. Miller, Greg Little, and Min Wu (Massachusetts Institute of Technology)

ENGENDERING TRUST: PRIVACY POLICIES AND SIGNATURES
Joshua B. Gross, Jessica Sheffield, Alice Anderson, and Nan Yu (Pennsylvania State University)

EXTENDING DESKTOP APPLICATIONS WITH POCKET-SIZE DEVICES
Roberto Silveira Silva Filho and David F. Redmiles (University of California, Irvine)

FOXTOR: ANONYMOUS WEB BROWSING
Sasha Romanosky and Cynthia Kuo (Carnegie Mellon University)

FUTURE DECRYPTION: SECURE THE TIME SENSITIVE INFORMATION
Bessie C. Hu, Anthony Y. Fu and Xiaotie Deng (City University of Hong Kong)

HITCHHIKING: A PRIVACY-PRESERVING FRAMEWORK FOR COLLECTING LOCATION-BASED DATA ON COMMODITY DEVICES
Karen P. Tang, James Fogarty, Pedram Keyani, Jason I. Hong (Carnegie Mellon University) and Anket Mathur (University of Texas - San Antonio)

HOW TO LOGIN FROM AN INTERNET CAFE WITHOUT WORRYING ABOUT KEYLOGGERS
Cormac Herley and Dinei Florencio (Microsoft Research)

HUMAN FRIENDLY CAPTCHAS - SIMPLE GAMES
Deapesh Misra and Kris Gaj (George Mason University)

IMPROVING THE PASSWORD SELECTION MECHANISM
Richard Conlan and Peter Tarasewich (Northeastern University CC&IS)

IMPROVING USER DECISIONS ABOUT OPENING POTENTIALLY DANGEROUS ATTACHMENTS IN E-MAIL CLIENTS
Ricardo Villamarin-Salomon, Jose Carlos Brustoloni (University of Pittsburgh), Matthew DeSantis and Ashley Brooks (Carnegie Mellon University)

INFORMATION REQUESTED BY WEB SITES AND USERS' COMPREHENSION OF PRIVACY POLICIES
Robert W. Proctor, M. Athar Ali (Purdue University), and Kim-Phuong L. Vu (California State University, Long Beach)

INFORMATION VISUALIZATION FOR RULE-BASED RESOURCE ACCESS CONTROL
Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso and Dennis Patrone (Johns Hopkins University)

INITIAL ADOPTION OF A DISTRIBUTED ACCESS CONTROL SYSTEM
Kami Vaniea, Lujo Bauer, Lorrie Cranor and Mike Reiter (Carnegie Mellon University)

INVESTIGATING SECURITY-RELATED BEHAVIORS AMONG COMPUTER USERS WITH MOTOR IMPAIRMENTS
John D'Arcy and Jinjuan Feng (Towson University)

MANAGING VISUAL PRIVACY WITHIN THE WEB BROWSER
Kirstie Hawkey and Kori M. Inkpen (Dalhousie University)

MEDIA CHARACTERIZATION FOR THE VISUALIZATION OF SECURE PATHS
Paul DiGioia and Paul Dourish (University of California, Irvine)

PROTECTING THE PRIVACY OF DISPLAYED INFORMATION
Peter Tarasewich, Jun Gong and Richard Conlan (Northeastern University)

ROLE-BASED ACCESS CONTROL FOR E-SERVICE INTEGRATION
Peter Lamb, Robert Power, Gavin Walker and Michael Compton (CSIRO ICT Centre)

SESAME: EXTENDING THE DESKTOP METAPHOR TO SUPPORT SECURITY DECISION MAKING
Jennifer Stoll, Craig Tashman and W. Keith Edwards (Georgia Institute of Technology)

SYMBOLS OF PRIVACY
Janice Tsai, Serge Egelman, Rachel Shipman, Kok-Chie Daniel Pu, Lorrie Cranor and Alessandro Acquisti (Carnegie Mellon University)

WHY JOHNNY STILL CAN'T ENCRYPT: EVALUATING THE USABILITY OF EMAIL ENCRYPTION SOFTWARE
Steve Sheng, Colleen Koranda, Jeremy Hyland and Levi Broderick (Carnegie Mellon University)

DISCUSSION SESSIONS

Johnny Can Obfuscate: Beyond Mother's Maiden Name

Moderator: Bill Cheswick, Lumeta

Challenge/response authentication is stronger than password authentication, but has traditionally required a device for computing the challenge. Though human computation is limited, people can compute simple responses to challenges. If the challenge and the corresponding response is obfuscated with decoy information, an authentication scheme might be strong enough for a number of applications. The signs used in major league baseball provide some interesting techniques for obfuscation. We will brainstorm about obfuscation techniques that might work for an authentication scheme and discuss the feasibility of such a scheme.

Teaching Usable Privacy and Security

Moderators: Lorrie Cranor and Jason Hong, CMU

As interest in usable privacy and security grows, new courses are being developed in this area. This discussion session will bring together faculty members who have taught or are interested in teaching courses related to usable privacy and security. Faculty members interested in teaching modules on security/privacy as part of an HCI course or modules on HCI/usability as part of a security course are also encouraged to participate. We will discuss curricula, course formats, readings, ideas for assignments and projects, etc. Faculty members are encouraged to bring copies of their syllabus or other course materials and/or pointers to their course web sites to share with participants.

Lorrie Cranor and Jason Hong (along with their colleague Michael Reiter) developed and taught a graduate Usable Privacy and Security Course at Carnegie Mellon University in Spring 2006 (see http://cups.cs.cmu.edu/courses/ups.html).

[slides]

Policy Management: A Central Theme for Usable Privacy and Security Systems

Moderator: John Karat, IBM T.J. Watson Research Center

In this session we will discuss the many ways in which policies may have an impact on security and privacy. This will include discussion of both individual concerns (e.g., what rules individuals might want to express concerning the use of information about them), organizational concerns (e.g., how to communicate and enforce the policies they have for protecting personal data), and how technology might evolve to allow dialogue or negotiation between parties regarding security and privacy policies. While privacy and security are not entirely about "setting rules and enforcing them," we do believe that information system privacy and security do involve many aspects of policy management, and that policy management is an important aspect of making such systems usable. Some topics for discussion include:

  • What are the similarities and differences in security and privacy policies?
  • How do standards contribute to development of privacy and security policies?
  • How should security and privacy policies be authored?
  • How do people know the policies in effect when interacting with a system?
  • What is the connection between high level policies and enforcement in IT systems?
  • How can IT policies be made easier for people to understand?

 

SOUPS is sponsored by Carnegie Mellon CyLab.