Exploring User-Centered Security Design for Usable Authentication Ceremonies

被引:11
|
作者
Fassl, Matthias [1 ,2 ]
Grober, Lea Theresa [1 ,2 ]
Krombholz, Katharina [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Saarland Univ, Saarbrucken, Germany
关键词
Instant Messaging; Man-in-the-Middle (MitM); Authentication; Usability; User-Centered Design;
D O I
10.1145/3411764.3445164
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security technology often follows a systems design approach that focuses on components instead of users. As a result, the users' needs and values are not sufficiently addressed, which has implications on security usability. In this paper, we report our lessons learned from applying a user-centered security design process to a well-understood security usability challenge, namely key authentication in secure instant messaging. Users rarely perform these key authentication ceremonies, which makes their end-to-end encrypted communication vulnerable. Our approach includes collaborative design workshops, an expert evaluation, iterative storyboard prototyping, and an online evaluation. While we could not demonstrate that our design approach resulted in improved usability or user experience, we found that user-centered prototypes can increase the users' comprehension of security implications. Hence, prototypes based on users' intuitions, needs, and values are useful starting points for approaching long-standing security challenges. Applying complementary design approaches may improve usability and user experience further.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A User-Centered Model for Usable Security and Privacy
    Feth, Denis
    Maier, Andreas
    Polst, Svenja
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 74 - 89
  • [2] Enhancing Security in User-Centered Authentication using KERI
    Boi, Biagio
    De Santis, Marco
    Esposito, Christian
    2024 32ND EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PDP 2024, 2024, : 161 - 166
  • [3] Adaptive User-Centered Security
    Wohlgemuth, Sven
    AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, 2014, 8708 : 94 - 109
  • [4] USER-CENTERED DESIGN STRATEGIES FOR BUILDING USABLE AND ENGAGING BEHAVIORAL HEALTH TECHNOLOGIES
    Wray, T. B.
    ALCOHOLISM-CLINICAL AND EXPERIMENTAL RESEARCH, 2017, 41 : 310A - 310A
  • [5] Applying User-Centered Techniques in the Design of a Usable Mobile Musical Composition Tool
    Chan, Kevin Gray
    Deja, Jordan Aiko
    Tobias, John Patrick
    Gonzales, Allen Vincent
    Dancel, Migo Andres
    PROCEEDINGS OF CHIUXID 2019: 5TH INTERNATIONAL ACM IN-COOPERATION HCI AND UX CONFERENCE, 2019, : 152 - 159
  • [6] Experiential User-Centered Security in a Classroom: Secure Design for IoT
    Sharevski, Filipo
    Treebridge, Paige
    Westbrook, Jessica
    IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (11) : 48 - 53
  • [7] A Set of Heuristics for Usable Security and User Authentication
    Realpe, Paulo C.
    Collazos, Cesar A.
    Hurtado, Julio
    Granollers, Antoni
    PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
  • [8] User-Centered Healthcare Design
    Duarte, Joana
    Guerra, Arminda
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE DEVELOPMENT FOR ENHANCING ACCESSIBILITY AND FIGHTING INFO-EXCLUSION (DSAI 2012), 2012, 14
  • [9] BEYOND USER-CENTERED DESIGN
    Lloveras, Joaquim
    ICED 09 - THE 17TH INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, VOL 2: DESIGN THEORY AND RESEARCH METHODOLOGY, 2009, : 157 - 165
  • [10] The case for user-centered design
    Soderston, C
    Rauch, TL
    STC 1996 PROCEEDINGS - 43RD ANNUAL CONFERENCE: EVOLUTION/REVOLUTION, 1996, : 337 - 340