44
Serge Egelman, UC Berkeley / ICSI the usable security & privacy group

the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

  • Upload
    others

  • View
    47

  • Download
    0

Embed Size (px)

Citation preview

Page 1: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

Serge Egelman, UC Berkeley / ICSI

the usable security& privacy group

Page 2: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

overview• framing privacy and security decisions• privacy and IoT• privacy on mobile devices

Page 3: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

FRAMING PRIVACY AND SECURITY DECISIONS

Page 4: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 5: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

nudges in the literature

• password meters• social framing• “strengthening”• quantifying password weakness

Page 6: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 7: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

meter

Page 8: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

social

Page 9: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

strengthening

Page 10: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

crack time

Page 11: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

psychometrics• consideration for future consequences (CFC)• need for cognition (NFC)• general decision-making style (GDMS)

• intuitive• avoidant• dependent• rational• spontaneous

Page 12: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

results

traits do predict nudge susceptibility:• low numeracy participants created weaker

passwords in response to quantitative feedback• rational and high-NFC participants responded

well to quantitative feedback• dependent decision-makers created weaker

passwords in social condition

Page 13: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 14: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 15: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

validation

• three conditions (n=923):• control• random (password meter or crack time)• optimal (targeted to psychometrics)

Page 16: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

10

11

12

13

14

15

control optimal random

Log-

trans

form

ed p

assw

ord

stre

ngh

ConditionF (2, 920) = 5.201, p = 0.006

N = 239, 460, 224, respectively

Planned contrast optimal vs. control+random showed the mean increase was by about 10% or 0.2 SDs (Cohen’s d ); p = 0.001

Page 17: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

12

13

14

15

pwd meter crack-time

optimal random

p = 0.009

the effect concentrated on the crack-time nudge, in which not optimizing resulted in worse passwords

Page 18: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

PRIVACY AND IOT

Page 19: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

privacy failuressystems that regulate data based on <data type> and <recipient> are bound to fail.

Page 20: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

privacy as contextual integrity

privacy violations occur when contextual norms are violated:

• I expect medical data to be used by my doctor for treatment

• I do not expect medical data to be used for marketing purposes

Page 21: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

applying CI in practiceinferring context is hard

• We cannot know exactly how data will be used

proxies can help• knowledge of recipient• data properties (e.g., source, permissions, etc.)• what the app does• what else was happening on the device

Page 22: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

smart TV studylarge survey on data collection and sharing – and protections

• Exploring differences by data type/format and by recipient

wide variation in assumptions about data collection and flows• Most people are against data being repurposed• …but assume it will happen regardless!

people believe legal protections exist to prevent egregious violations• (they don’t)

study was cited in lawsuit against Vizio for selling customers’ viewing data without their knowledge or consent.

N. Malkin, J. Bernd, M. Johnson, and S. Egelman. “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S. In Proceedings of the European Workshop on Usable Security (EuroUSEC), 2018.

Page 23: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

study of current usersWhen do users expect to be recorded?

What do they expect will happen to that data?

How often do current devices record inappropriately?

Page 24: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 25: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 26: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 27: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 28: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

PRIVACY ON MOBILE DEVICES

Page 29: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

tools for observing data flows

Instrumented Android: Access to sensitive resources (e.g., location, call logs, network state, various identifiers, etc.)

Haystack: Network traffic, remote servers, HTTP/HTTPS payloads

Page 30: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

automatic behavior detection

what data goes to which parties?

is location data collected?

what persistent identifiers are collected?• are they shared across apps?

Page 31: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

observing app data flows

network flows are dynamically generated by apps at runtime

apps need to be run so that as much code gets executed as possible

Page 32: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

generating datasolution 1: cheap labor

solution 2: Exerciser Monkey!

Page 33: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 34: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

things we’re detectinglegal violations

incompetent uses of PII

deceptive practices

Page 35: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

detecting COPPA violationsapps targeted at children under 13 must:

• attain parental consent when collecting personal identifiers

• allow parents to limit data collection• list all data recipients• transfer data securely• not use behavioral targeting• post privacy policies

Page 36: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

[potential] violations abound7,076 Family apps tested

• 65% (4,575) transmit identifiers• 56% (3,950) transmit hardware-based identifiers

• IMEI, WiFi MAC, Android ID, GSF ID, or serial number• 74% (2,929) do so alongside the Android Ad ID (AAID)

• 8% (569) transmit PII• Phone number, email address, name, and/or location

Page 37: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

parental consentnone of these are using effective age gating(the monkey was able to click through)

in several cases, identifiers are sent before the consent screen is shown

Page 38: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 39: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 40: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 41: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices
Page 42: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

Android.apk

Repository

Virtual Machinesfor

Dynamic Analysis

CrowdsourcedUser

Interactions

Simulated User

Interactions

Results Database

Website

API

Page 43: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

thanks!group members:Noura AlomarJulia BerndAlisa FrikMaritza JohnsonNathan MalkinIrwin ReyesNikita SamarinPrimal Wijesekera

external colleagues:Nathan Good (Good Research/UCB)Marian Harbach (Google)Helen Nissenbaum (Cornell)Eyal Peer (Hebrew U.)Joel Reardon (U. Calgary)Franziska Roesner (UW)Florian Schaub (UMich)Narseo Vallina-Rodriguez (IMDEA/ICSI)

students/visitors:Amit Elazari (UCB)Mitra Hosseini (UTSA)Tomasz Kosinski (Chalmers U.)Arunesh Mathur (Princeton)Leysan Nurgalieva (U. Trento)Abbas Razaghpanah (Stony Brook)Madiha Tabassum (UNCC)

Page 44: the usable security & privacy group · the usable security & privacy group. overview • framing privacy and security decisions • privacy and IoT • privacy on mobile devices

thanks!

Serge [email protected]@v0max