• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Scopus
  4. Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario
 
  • Details
  • Full
Options
2024
Conference Paper
Title

Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario

Abstract
To achieve a higher level of protection against person-in-the-middle attacks when using common chat apps with end-to-end encryption, each chat partner can verify the other party's key material via an out-of-band channel. This procedure of verifying the key material is called an authentication ceremony (AC) and can consist of, e.g., comparing textual representations, scanning QR codes, or using third party social accounts. In the latter, a user can establish trust by proving that they have access to a particular social media account. A study has shown that such social authentication's usability can be very good; however, the study focused exclusively on secure cases, i.e., the authentication ceremonies were never attacked. To evaluate whether social authentication remains usable and secure when attacked, we implemented an interface for a recently published social authentication protocol called SOAP. We developed a study design to compare authentication ceremonies, conducted a qualitative user study with an attack scenario, and compared social authentication to textual and QR code authentication ceremonies. The participants took on the role of whistleblowers and were tasked with verifying the identities of journalists. In a pilot study, three out of nine participants were caught by the government due to SOAP, but with an improved interface, this number was reduced to one out of 18 participants. Our results indicate that social authentication can lead to more secure behavior compared to more traditional authentication ceremonies and that the scenario motivated participants to reason about their decisions.
Author(s)
Häring, Maximilian
Universität Bonn
Grohs, Julia Angelika
Universität Bonn
Tiefenau, Eva
Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie FKIE  
Smith, Matthew  
Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie FKIE  
Tiefenau, Christian
Universität Bonn
Mainwork
Twentieth Symposium on Usable Privacy and Security, SOUPS 2024. Proceedings  
Conference
Symposium on Usable Privacy and Security 2024  
Link
Link
Language
English
Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie FKIE  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024