♫musicjinni

USENIX Security '22 - Neither Access nor Control: A Longitudinal Investigation of the Efficacy...

video thumbnail
USENIX Security '22 - Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones

Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, and Konstantin Beznosov, University of British Columbia

The incumbent all-or-nothing model of access control on smartphones has been known to dissatisfy users, due to high overhead (both cognitive and physical) and lack of device-sharing support. Several alternative models have been proposed. However, their efficacy has not been evaluated and compared empirically, due to a lack of detailed quantitative data on users' authorization needs. This paper bridges this gap with a 30-day diary study. We probed a near-representative sample (N = 55) of US smartphone users to gather a comprehensive list of tasks they perform on their phones and their authorization needs for each task. Using this data, we quantify, for the first time, the efficacy of the all-or-nothing model, demonstrating frequent unnecessary or missed interventions (false positive rate (FPR) = 90%, false negative rate (FNR) = 21%). In comparison, we show that app- or task-level models can improve the FPR up to 88% and the FNR up to 20%, albeit with a modest (up to 15%) increase in required upfront configuration. We also demonstrate that the context in which phone sharing happens is consistent up to 75% of the time, showing promise for context-based solutions.

View the full USENIX Security '22 program at https://www.usenix.org/conference/usenixsecurity22/technical-sessions

USENIX ATC '19 - Zanzibar: Google’s Consistent, Global Authorization System

USENIX ATC '22/OSDI '22 Joint Keynote Address - Surprise-Inspired Networking

USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers

Why Attend USENIX Conferences?

USENIX ATC '19 - SemperOS: A Distributed Capability System

USENIX Security '21 - Automatic Policy Generation for Inter-Service Access Control of Microservices

USENIX ATC '20 - OpenExpress: Fully Hardware Automated Open Research Framework for Future Fast...

USENIX ATC '22 - Direct Access, High-Performance Memory Disaggregation with DirectCXL

USENIX ATC '22 - HyperEnclave: An Open and Cross-platform Trusted Execution Environment

USENIX ATC '13 - Opening Remarks

USENIX ATC '19 - Optimizing CNN Model Inference on CPUs

USENIX Enigma 2019 - Building Identity for an Open Perimeter

USENIX ATC '23 - Portunus: Re-imagining Access Control in Distributed Systems

USENIX Enigma 2023 - Adventures in Authentication and Authorization

USENIX Security '21 - PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal...

USENIX Security '22 - Practical Data Access Minimization in Trigger-Action Platforms

USENIX Security '22 - How and Why People Use Virtual Private Networks

USENIX Enigma 2023 - Technical Metamorphosis: The 3 Stages of DSAR Automation

USENIX Security '22 - Zero-Knowledge Middleboxes

USENIX ATC '22/OSDI '22 Joint Keynote Address - Trustworthy Open Source: The Consequences of Success

USENIX ATC '13 - Awards and Closing Remarks

USENIX Security '22 - Open to a fault: On the passive compromise of TLS keys via transient errors

USENIX Security '16 - Security Competitions

USENIX Security '20 - Detecting Stuffing of a User’s Credentials at Her Own Accounts

USENIX Security '22 - Neither Access nor Control: A Longitudinal Investigation of the Efficacy...

USENIX Security '21 - Using Amnesia to Detect Credential Database Breaches

USENIX Enigma 2023 - Technology Abuse Clinics for Survivors of Intimate Partner Violence

USENIX Security '22 - Security and Privacy Perceptions of Third-Party Application Access for Google

USENIX Enigma 2023 - Open Source Software and Journalism: Field Notes from a Global Perspective

USENIX Security '21 - PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack

Disclaimer DMCA