the usable security & privacy group · the usable security & privacy group. overview • framing...

44
Serge Egelman, UC Berkeley / ICSI the usable security & privacy group

Transcript of the usable security & privacy group · the usable security & privacy group. overview • framing...

Page 1: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

Serge Egelman, UC Berkeley / ICSI

the usable security& privacy group

Page 2: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

overview• framing privacy and security decisions• privacy and IoT• privacy on mobile devices

Page 3: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

FRAMING PRIVACY AND SECURITY DECISIONS

Page 4: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 5: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

nudges in the literature

• password meters• social framing• “strengthening”• quantifying password weakness

Page 6: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 7: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

meter

Page 8: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

social

Page 9: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

strengthening

Page 10: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

crack time

Page 11: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

psychometrics• consideration for future consequences (CFC)• need for cognition (NFC)• general decision-making style (GDMS)

• intuitive• avoidant• dependent• rational• spontaneous

Page 12: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

results

traits do predict nudge susceptibility:• low numeracy participants created weaker

passwords in response to quantitative feedback• rational and high-NFC participants responded

well to quantitative feedback• dependent decision-makers created weaker

passwords in social condition

Page 13: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 14: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 15: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

validation

• three conditions (n=923):• control• random (password meter or crack time)• optimal (targeted to psychometrics)

Page 16: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

10

11

12

13

14

15

control optimal random

Log-

trans

form

ed p

assw

ord

stre

ngh

ConditionF (2, 920) = 5.201, p = 0.006

N = 239, 460, 224, respectively

Planned contrast optimal vs. control+random showed the mean increase was by about 10% or 0.2 SDs (Cohen’s d ); p = 0.001

Page 17: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

12

13

14

15

pwd meter crack-time

optimal random

p = 0.009

the effect concentrated on the crack-time nudge, in which not optimizing resulted in worse passwords

Page 18: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

PRIVACY AND IOT

Page 19: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

privacy failuressystems that regulate data based on <data type> and <recipient> are bound to fail.

Page 20: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

privacy as contextual integrity

privacy violations occur when contextual norms are violated:

• I expect medical data to be used by my doctor for treatment

• I do not expect medical data to be used for marketing purposes

Page 21: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

applying CI in practiceinferring context is hard

• We cannot know exactly how data will be used

proxies can help• knowledge of recipient• data properties (e.g., source, permissions, etc.)• what the app does• what else was happening on the device

Page 22: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

smart TV studylarge survey on data collection and sharing – and protections

• Exploring differences by data type/format and by recipient

wide variation in assumptions about data collection and flows• Most people are against data being repurposed• …but assume it will happen regardless!

people believe legal protections exist to prevent egregious violations• (they don’t)

study was cited in lawsuit against Vizio for selling customers’ viewing data without their knowledge or consent.

N. Malkin, J. Bernd, M. Johnson, and S. Egelman. “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S. In Proceedings of the European Workshop on Usable Security (EuroUSEC), 2018.

Page 23: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

study of current usersWhen do users expect to be recorded?

What do they expect will happen to that data?

How often do current devices record inappropriately?

Page 24: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 25: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 26: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 27: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 28: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

PRIVACY ON MOBILE DEVICES

Page 29: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

tools for observing data flows

Instrumented Android: Access to sensitive resources (e.g., location, call logs, network state, various identifiers, etc.)

Haystack: Network traffic, remote servers, HTTP/HTTPS payloads

Page 30: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

automatic behavior detection

what data goes to which parties?

is location data collected?

what persistent identifiers are collected?• are they shared across apps?

Page 31: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

observing app data flows

network flows are dynamically generated by apps at runtime

apps need to be run so that as much code gets executed as possible

Page 32: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

generating datasolution 1: cheap labor

solution 2: Exerciser Monkey!

Page 33: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 34: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

things we’re detectinglegal violations

incompetent uses of PII

deceptive practices

Page 35: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

detecting COPPA violationsapps targeted at children under 13 must:

• attain parental consent when collecting personal identifiers

• allow parents to limit data collection• list all data recipients• transfer data securely• not use behavioral targeting• post privacy policies

Page 36: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

[potential] violations abound7,076 Family apps tested

• 65% (4,575) transmit identifiers• 56% (3,950) transmit hardware-based identifiers

• IMEI, WiFi MAC, Android ID, GSF ID, or serial number• 74% (2,929) do so alongside the Android Ad ID (AAID)

• 8% (569) transmit PII• Phone number, email address, name, and/or location

Page 37: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

parental consentnone of these are using effective age gating(the monkey was able to click through)

in several cases, identifiers are sent before the consent screen is shown

Page 38: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 39: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 40: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 41: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.
Page 42: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

Android.apk

Repository

Virtual Machinesfor

Dynamic Analysis

CrowdsourcedUser

Interactions

Simulated User

Interactions

Results Database

Website

API

Page 43: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

thanks!group members:Noura AlomarJulia BerndAlisa FrikMaritza JohnsonNathan MalkinIrwin ReyesNikita SamarinPrimal Wijesekera

external colleagues:Nathan Good (Good Research/UCB)Marian Harbach (Google)Helen Nissenbaum (Cornell)Eyal Peer (Hebrew U.)Joel Reardon (U. Calgary)Franziska Roesner (UW)Florian Schaub (UMich)Narseo Vallina-Rodriguez (IMDEA/ICSI)

students/visitors:Amit Elazari (UCB)Mitra Hosseini (UTSA)Tomasz Kosinski (Chalmers U.)Arunesh Mathur (Princeton)Leysan Nurgalieva (U. Trento)Abbas Razaghpanah (Stony Brook)Madiha Tabassum (UNCC)

Page 44: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices.

thanks!

Serge [email protected]@v0max