Title: Designing Usable Security Solutions
1Designing Usable Security Solutions
- Mike Just
- Treasury Board of Canada, Secretariat
- May 11, 2003
2Usable Security
- First impressions?
- Usable security ? Nice GUI?
- Secure and usable software?
- Is it possible to simultaneously achieve both
security and usability? - Secure software is not usable.
- Software security is useable. Whats the problem?
- Maybe for a technical person...
3Usable SecurityNice GUI?
- Nice GUIs are necessary but not sufficient for
usable software security - Sadly, some think a nice interface ? security
- The web site that was judged to have the best
presentation as determined by participants
ratings was the site judged to be most secure. - Carl Turner, How do consumers form their
judgment of the security of e-commerce web
sites?, April 2003
4Usable SecurityPossible?
- Arent security and usability diametrically
opposed principles? - Increased security will decrease usability.
- Sometimes yes, but it depends on how the security
process or technique is applied. - Increased usability will decrease security.
- Sometimes yes, but it depends on how the security
process or technique is applied. - Poor usability decreases security
5Usable Security
- State of the Nation
- Many security systems are not usable
- Decreased productivity
- Improper application of security principles
- Security techniques not widely used
- Not needed?
- Too complicated (to use or implement)?
- Benefits not well understood?
- Often viewed as an obstacle to productivity
6Outline
- Introduction
- Usable security testing and design
- Designing usable security technology
- Outlook and concluding remarks
7Outline
- Introduction
- Usable security research
- Are users to blame?
- Security background
- Usable security testing and design
- Designing usable security technology
- Outlook and concluding remarks
8Usable Security RD
- Systems security is one of the last areas in
IT in which user-centered design and user
training are not regarded as essential. - Adams and Sasse, 1999
- Hackers pay more attention to the human link
in the security chain than security designers
do. - Adams and Sasse, 1999
9Usable Security RD (2)
- Few research papers in this area
- Little cross-pollination between security
researchers and human factors experts - No journals or magazines dedicated to this
multi-disciplinary research activity - No conference dedicated to this
multi-disciplinary research activity - Recent exception Workshop on Human-Computer
Interaction and Security Systems, April 2003
10Usable Security RD (3)
- But there is hope!
- Usability considerations are included in the
design of more software applications - Human Oriented Technology (HOT) Lab at Carleton
- It is hoped that this interest will extend to
secure system design
11Outline
- Introduction
- Usable security research
- Are users to blame?
- Security background
- Usable security testing and design
- Designing usable security technology
- Outlook and concluding remarks
12Are Users the Problem?
- Humans are incapable of securely storing
high-quality cryptographic keys, and they have
unacceptable speed and accuracy when performing
cryptographic operations. (They are also large,
expensive to maintain, difficult to manage, and
they pollute the environment. It is astonishing
that these devices continue to be manufactured
and deployed. But they are sufficiently pervasive
that we must design our protocols around their
limitations.) - C. Kaufman, R. Perlman, M. Speciner, Network
Security, 2002
13Are Users the Problem? (2)
- Desktop operating systems and the individuals
operating them become the most obvious vulnerable
avenues of attack for internal and external
threats. - Iván Arce, The Weakest Link Revisited, IEEE
Security Privacy Magazine, March/April 2003 - People are the biggest security risk.
- John Leyden, TheRegister, 19 March 2003
- Often the hardest part of cryptography is
getting people to use it. - Bruce Schneier
14Are Users the Problem? (3)
- Users have limitations
- Users are vulnerable
- Security techniques often
- Not used
- Not used correctly
- Should we blame users, designers, or both?
15Designing Usable Security Solutions
- Applications, systems, networks designed to
provide appropriate level of security - E.g. Banking online, healthcare files,
proprietary information, secure email - What security is provided and how is it
compromised?
16Security Services
- Confidentiality
- Keeping information secret from all but those who
are authorized to see it - Integrity
- Ensuring information has not been altered by
unauthorized or unknown means - Availability
- Uptime of services and resources
17Security Services (2)
- Authorization
- Controlling access to information or resources
- Controlling privileges to perform actions
- Authentication
- Ensuring proper and correct identification
- Accountability
- Collecting evidence regarding commitments or
actions - Preventing their denial
18Attack Model
Threat Agent
Vulnerability
Asset
Threat/Security Event
19Attack Model (2)
- Threat Agents
- Intentional or Unintentional
- Intentional - Hackers, insiders, ...
- Vulnerabilities
- Design or programmatic, e.g. buffer overflows
- Operational error (by humans)
- Assets
- Data, system resources, productivity,
20Attack Model (3)
- Usability design of secure systems is primarily
concerned with protecting against user error
(I.e. against their own behaviour) - Purposeful action
- Users dont understand or accept the stated risk
- Users are frustrated and cant perform required
action - Mistaken action
- Users not aware of erroneous action
21Potential Human Errors
- Confidentiality
- Purposely or mistakenly failing to encrypt
- Authorization
- Purposely or mistakenly setting or granting
privileges, e.g. executing attachments - Availability
- Purposely or mistakenly abusing system resources
22Potential Human Errors (2)
- Example passwords
- Improper sharing
- Writing down
- Poorly chosen
- Revealing
- Single password across multiple systems
- Concern with different assurance levels
-
23Are Users to Blame?
- Certainly, they can cause security breaches, but
are they to blame? - Partly, but how can users be helped?
- Improved software and system design
- Better applications
- Better technology
- Awareness, training and education
24Are Designers to Blame?
- Is security usability different?
- Security not viewed as an enabling task
- Design must consider an adversary
- Security design has a military mathematical
history - Integration of other knowledge required
- Socio-technical systems
- Safety-critical system design
- Social psychology
25Outline
- Introduction
- Usable security research
- Are users to blame?
- Security background
- Usable security testing and design
- Designing usable security technology
- Outlook and concluding remarks
26Security Background
- Encryption and decryption are the processes by
which data is respectively scrambled and
unscrambled - Data (plaintext) is encrypted to ciphertext
- Ciphertext is decrypted to original data
(plaintext) - An encryption/decryption function takes as input
- The data to be encrypted/decrypted, and
- A cryptographic key.
- With symmetric cryptography, the encryption and
decryption functions use the same secret key K - Originator and recipient must share K to
facilitate secure communications
27Security Background (2)
- With asymmetric or public key cryptography, a
public key is used to encrypt, while a
corresponding private key is used to decrypt - Originator uses the public key of recipient for
encryption of data for recipient - The private key may be used to digitally sign
data, while the public key is used to verify the
signature - Originator uses their private key to sign, while
recipient must have public key to verify
28Security Background (3)
Originator
Recipient
Symmetric Key Based
Encrypt plaintext with shared key K
Decrypt ciphertext with shared key K
Encrypt plaintext with recipients public key
Decrypt ciphertext with corresponding key
Public Key Based
Sign data with own private key
Verify signed data with originators public key
29Security Background (4)
- To ensure they integrity of public keys, they are
typically contained within a certificate - Certificates are often produced by a
Certification Authority (CA) - Technically, the certificate is a digitally
signed object binding the public key to the owner
of the corresponding private key - Example
- To send payment information to Amazon.com, your
browser will validate a certificate issued to
Amazon.com by Verisign. If valid, the public key
in this certificate is used to encrypt your
payment information.
30Outline
- Introduction
- Usable security testing and design
- Designing usable security technology
- Outlook and concluding remarks
31Application Design
- Most noted study in this area is
- Alma Whitten, Doug Tygar, Why Johnny Cant
Encrypt A Usability Evaluation of PGP 5.0,
Usenix Security Symposium, 1999 - PGP (Pretty Good Privacy) is a security
application used for - Encryption and signing of data
- Users generate and sign own certificates
- Web of Trust
32PGP
33Results of PGP Study
- Dispels notion that
- Security program nice GUI usable
- PGP 5.0 claimed a significantly improved
graphical user interface makes complex
mathematical cryptography accessible to novice
computer users.
34Usable Security Defined
- Definition Usability for Security
- User can tell what needs to be done.
- User can figure out how to do it.
- User doesnt make dangerous errors.
- User doesnt get annoyed and give up.
- Study methodology
- Cognitive walkthrough, heuristic evaluation
- User testing
35Cognitive Walkthrough
- Visual metaphors could signal better
- Encrypt-decrypt ok, but depict single key
- Signing shows pen, not key
- Signature verification not depicted
- Publishing of keys hidden
- Key validity and trust obscure
- Little support against irreversible errors
- Lack of feedback and other protection
36User Testing Walkthrough
37Issues
- Level of abstraction for security technology
- What information is presented to users?
- Different user backgrounds, context
- Breadth and depth
- Oodles of good information
- How much detail to provide (tools versus
appliances)
38Other Usability Design Research
- Privacy Bird Interface
- Interface for user administration of P3P policies
- Design choices for usability
- Chirping bird
- Present default settings (low, med, high)
- Hierarchical display of information
- Network Monitoring Interface
- Single interface for network activity
- Depth of information presented hierarchically
39Other Usability Design Research (2)
- Safe staging of security functionality
- Adapted from conventional user interface staging
- Staging variations
- Hard - explicit enforcement, user restriction
- Soft - encourages progression, user freedom
- Function-restricted - user competence
- Data-restricted - user competence
40Other Usability Design Research (3)
- Combination of soft data restricted staging for
general users - Principles of informing user of consequences and
providing temporary avoidance strategies borrow
from ANSI standard for consumer product warning
labels - User is guided and educated at each stage
- Support for conscious exploration
- Allows for informed decisions at each stage
41Outline
- Introduction
- Usable security testing and design
- Designing usable security technology
- Identification techniques
- Other identification security measures
- Outlook and concluding remarks
42Identification Techniques
- When does one identify themselves
- At registration
- Initial account set-up
- At login (or time of transaction)
- Normal use
- At recovery
- Account maintenance
43Identification Techniques (2)
- Main types of issues
- Too many credentials to remember/use
- Use and management of each individual credential
- Will focus on use and management
- Research meets privacy and security
- Can be difficult to get statistics
- Accurate results must be taken in proper context
44Identification Techniques (3)
- Something you know
- Password, passphrase, PIN
- Something you have
- Smartcard, bank card
- Something you are
- Fingerprint, voice, retinal or iris, hand geometry
45Identification Techniques (4)
- Usability criteria
- Issuance - Easy to obtain (at registration)
- Recall - Easy to remember (carry/transport in
case of tokens) - Use Easy to use consistent and repeatable
behaviour - Maintenance Easy to replace in case of
compromise or loss
46Something You Have
- Issuance In-person, or out-of-band delivery
- Recall No human memory requirements
- Use Typically easy to use though often require
a card reader - Maintenance New token requires in-person
presence or out-of-band delivery - Few usability studies
47Something You Are
- Issuance You have it server doesnt.
Registration ability is not universal - Recall Easy
- Use Use may be intrusive to some (e.g. retinal
scan). Balance between false positive and
negatives - Maintenance Limited supply for renewal
48Something You Know
- Issuance Easy to obtain
- Recall Depends upon type, and memory of user
- Use Easy to use, though repeatability can be a
problem - Maintenance Typically easy to update, though
can still have recall issues
49Something You Know (2)
- Specific examples
- Passwords
- Graphical passwords
- Cognitive passwords
50Password Identification
- Most common form of identification
- Passwords, passphrases, PINs
- Numerous applications
- Online banking
- ATM banking
- School/work account access
51Password Identification (2)
- Issues affecting usability
- Password length
- Password construction
- Password entering
- Password management
52Password Length
- Often require 8 characters
- For certain attacks, this is too short
- And its getting worse human memory isnt
increasing at the rate of computers - For human memory, this is too long
- Options for improvement
- Prevent attacks requiring longer passwords
- Use alternative to passwords
53Password Construction
- To prevent dictionary attacks
- Alphabetic, numeric, punctuation, special
characters - Human memory has difficultly with non-dictionary
words - Pneumonics would help, but require training
- Options for improvement
- Prevent attacks requiring awkward password
construction - Use alternative to passwords
54Password Entering
- Problem
- Limits on number of failed attempts affect
usability and are susceptible to DoS attacks - No limits allow exhaustive password guessing
- Options for improvement
- Prevent attacks requiring attempt limits
- For usability sake, use a reasonable limit, e.g.
10 failed attempts
55Password Management
- Update requirements onerous
- Human memory must remember new value
- Human memory has difficultly forgetting old value
- Users often bypass with tricks that defeat
purpose of update - Options for improvement
- Prevent attacks requiring password updates
- Have reasonable update requirements (if any at
all)
56Improving Passwords
- Options for improvement
- Prevent attacks requiring longer passwords
- Use alternative to passwords
- Requires 100 correct, unaided recall of
non-meaningful item Sasse, 2003 - Passwords place unrealistic expectations on users
57Graphical Passwords
- Idea is to use a password space in which the
subset of memorable passwords is increased - User convenience
- Improved recall
- Increase entropy (information content)
- Some ideas
- Current linear password interface is too
restrictive - Pictures are often more memorable to humans
58Graphical Passwords Textual
- Graphical interface for textual password
- Jermyn et al., Usenix Security 1999
- Consider familiar password process
- password G _ _ _ _ _
- password G o _ _ _ _
- password G o p _ _ _
- password G o p h _ _
- password G o p h e _
- password G o p h e r
- Temporal order is tied to input position
59Graphical Passwords Textual.
- Dont link input position to temporal order
- password _ _ G _ _ _
- password _ _ G o _ _
- password _ p G o _ _
- password _ p G o h _
- password e p G o h _
- password e p G o h r
- Other memorable passwords possible
- E.g. reverse, rotation, even-then-odd, outside-in
- At least as strong as textual passwords
60Graphical Passwords DAS
- DAS Draw A Secret
- Jermyn et al., Usenix Security 1999
- Login screen presented as a Grid
- User touches a point in each cell
- Password or key derived from the order of cells
touched by user
61Graphical Passwords DAS (2)
pen-up
- (2,2)(3,2)(3,3)(2,3)(2,2)(2,1)(5,5)
62Graphical Passwords DAS (3)
- Analysis
- Recursive function defined to count the number of
possible graphical passwords - For a 5x5 grid, 12 point graphical passwords
exceed 8 character textual - But were concerned with the number of memorable
passwords
63Graphical Passwords DAS (4)
- Define a class of passwords that is a subset of
memorable passwords - Graphical passwords based on simple shapes, e.g.
rectangles - Graphical passwords generated by a short program
in a grid-based language - Cardinality shown to be larger than the
dictionary of textual passwords - Unclear what the graphical password dictionary is
64Graphical Passwords DAS (5)
65Graphical Passwords DAS (6)
66Cognitive Passwords
- Passwords that are already known to the
individual - Typical use-case is for account recovery when
all-else is forgotten - Often known as challenge questions or recovery
hints
67Cognitive Passwords (2)
- Familiar or common types
- Question
- Fixed list provided to user
- Open user provides question
- Answer
- Fixed answer selected from list
- Open user provides answer
68Cognitive Passwords (3)
- Usability improvements
- Improved question selection
- Pose fixed, but general question
- Improved memorize-ability
- Customization with user-provided hint
- Improved repeatability
- Control form of answers
69Cognitive Passwords (4)
- Example
- Question What is memorable place for you?
- Hint _______________
- Answer _______________
1st vacation
Moscow Hilton
70Outline
- Introduction
- Usable security testing and design
- Designing usable security technology
- Identification techniques
- Other identification security measures
- Outlook and concluding remarks
71Other Identification Security Measures
- If protection against online attacks is possible,
then need for password length, construction,
entering and management are lessened - Client or user work
- Puzzles
- Reverse Turing Tests
72Client Puzzles
- Online attacks are most effective when theyre
automated - Augment an identification technique so as to slow
down the identification process - Ask user to perform computational task
- Result returned and validated along with
identification information - Computational task unpredictable
- Low computational effort and storage for server
73Client Puzzles (2)
Server
74Client Puzzles (3)
- Puzzle solved through function inversion
160 bits
Pair (X, Y) is k-bit-hard puzzle
75Client Puzzles (4)
76Client Puzzles (5)
Server computes
secret S
time T
password P
hash
pre-image X
hash
image Y
77Reverse Turing Tests
- Use an identification technique that ensures its
a human whos identifying - CAPTCHA project at Carnegie Mellon
- Produce a short test that
- Most humans can pass
- Current computers cant (or at least find it
difficult)
78CAPTCHA Example
- Enter 3 words from the following
79Reverse Turing Tests
- Other methods possible
- Pictures
- Animal recognition
- Pattern recognition
- Differences between pictures
- Common element in pictures
- Sounds
80Outline
- Introduction
- Usable security testing and design
- Designing usable security technology
- Outlook and concluding remarks
81Outlook
- Usability and security is a new and exciting
research area - Challenges
- Understanding what will work for users (when
users have different background, context) - Collecting accurate empirical data
- Tools versus appliances
- Developing and validating usable security
technology - Awareness, training and education
82Highlights
- On it own, a nice GUI is not enough
- Think outside the box
- Interdisciplinary study
- Design usable security software and technology
with your mother in mind - If its not usable, its probably not secure
- Must protect users from themselves
83References
- Security and Usability Bibliographies
- http//www.sims.berkeley.edu/rachna/security_usab
ility.html - http// www.sims.berkeley.edu/alma/biblio.html
- Recent papers
- http//www.andrewpatrick.ca/
- See HCI and Security Systems Workshop
- Look at the references in these papers as well
- Contact Just.Mike_at_tbs-sct.gc.ca