vulnerability blame
play

Vulnerability & Blame: Making Sense of Unauthorized Access to - PowerPoint PPT Presentation

Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones Diogo Tiago Lus Ivan Konstantin Marques Guerreiro Carrio Beschastnikh Beznosov @ @ @ Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Konstantin Beznosov


  1. Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones Diogo Tiago Luís Ivan Konstantin Marques Guerreiro Carriço Beschastnikh Beznosov @ @ @

  2. Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Konstantin Beznosov & Luís Carriço. 2016. Snooping on Mobile Phones: Prevalence and Trends . Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).

  3. What are incidents of unauthorized access like?

  4. What are incidents of unauthorized physical access to smartphones involving people known to each other like?

  5. Approach Female Male Collect accounts of incidents: 18-24 years-old 25-44 45+ ● experienced either as smartphone owner or person accessing smartphone ● written as stories Data: 102 open-text stories collected from Prolific Participant demographics

  6. Ash and Val had been dating for about two years, and things were rocky. Ash seemed distant and uninterested in Val most of the time, which became a large problem in their relationship. Ash progressively became more distant and absent, and Val could hardly stand it. One night while Ash was fast asleep in their bed, Val decided to look through Ash's phone on the bedside table. Signs of infidelity, possibly from the beginning of their relationship were on the phone. There were text messages with sexually explicit photos and pet names. Val waited until the morning to mention what was found to Ash. When Ash woke up, the phone was displaying one of the photos and the jig was up. It was obvious that Val had found out what had been going on. Val had already packed up everything and was ready to leave. Ash never saw Val again. (P54)

  7. Analysis 1. Unpacking incidents ○ What happens in incidents of unauthorized access to smartphones? 2. Making sense of incidents ○ How did participants represent incidents, and what does that tell us?

  8. Unpacking incidents ● Coding of stories from explicit evidence in the text ● Two raters coded subset of 10 Type of relationship stories, with 95% agreement Motivation Opportunity Use of locks Val’s actions Outcome: 61 codes, in 8 Awareness categories Aftermath Relationship termination

  9. Val Ash Convention: Val accessed Ash’s smartphone without permission

  10. What was the relationship between Ash and Val? Ash and Val were Ash and Val were Ash and Val were Ash and Val were Ash and Val were None of the intimate partners , friends , including family members acquaintances . co-workers who aforementioned, or former intimate people from work other than intimate were not not enough “Val and Ash were partners, or one of or school who are partners considered to be information to mutual friends of them aspired to an considered friends friends decide. “Ash had recently Charlie and had intimate “Ash and Val were lost the phone only just met.” P31 “Ash and Val are relationship with best mates and charger, but luckily coworkers” P14 the other having a drink at their mother Val “Ash and Val were Val's house before was happy to married and having going to a party.” share theirs.” P42 relationship P88 issues.” P86 Val Ash

  11. What was the primary motivation for unauthorized access? Control - Val wanted to Val wanted to play a Val wanted to use Exploit - Val wanted to None of the learn about, or prank on Ash some of the device's steal something from aforementioned, or not influence, Ash’s functionality out of Ash enough information to “Val accessed Ash's relationships with third convenience decide. smartphone to frape “Val quickly grabbed parties Ash on Facebook.” P53 “Val wanted to check the phone and sent “Val knew for sure that one of their online money to themselves. Ash was being accounts and, having Val then locked the unfaithful and had the not brought their own phone, and put it back desire to know more smartphone, decided to where it was.” P50 about it, and to make use Ash's” P10 sure it did not happen again.” P99 Val Ash

  12. How did the opportunity for unauthorized access came about? Val accessed Ash’s device while it was unattended Val accessed a device that was not Ash's current smartphone “Ash lent me their iPad and I went through all of the messages that also appeared on their smartphone” P25 Val deceived or misrepresented to create an opportunity for unauthorized access. “Val said they wanted to check something on the internet. Ash unlocked their phone not thinking twice about the request.” P27 None of the above, or not enough information to Val Ash decide.

  13. How did the opportunity for unauthorized access came about? Val accessed Ash’s device while it was unattended Val accessed a device that was not Ash's current smartphone Device was Device was Device was Device was Device was “Ash lent me their iPad and unattended unattended unattended at unattended unattended in I went through all of the while Ash went while Ash was home while while Ash went some other messages that also to the asleep Ash went to a meeting circumstances, appeared on their bathroom outside do or not enough smartphone” P25 “Val slipped “Ash was in a something information to “It was a their hand meeting, but decide. perfect timing delicately “Ash one day Ash had left the to access Ash's under the left their smart cellphone at Val deceived or phone because pillow, to phone out, with the desk” P14 misrepresented to create Ash usually extricate Ash's the Paypal app an opportunity for took some time phone from its on it, while they unauthorized access. while taking a usual charging went to do bath.” P99 position” P47 some running.” “Val said they wanted to P50 check something on the internet. Ash unlocked their phone not thinking twice about the request.” P27 None of the above, or not enough information to Val Ash decide.

  14. Did the device have a lock set up? Device had a lock set up, but Val overcame it Device did not have a lock set up “Ash had an Android smartphone which was password protected. However, they disabled the password protection at some point, because the screen kept timing out when using a GPS program while driving.” P89 None of the above, or not enough information to decide.

  15. Did the device have a lock set up? Device had a lock set up, but Val overcame it Val passively knew Val actively Val found that the Device had a lock, the lock code discovered the lock lock code was easy but was Device did not have a lock beforehand, for code through to guess temporarily set up instance because it observation unlocked “Val tried to access had been shared “Ash had an Android “Val had been the phone using “Ash had left the smartphone which was “Val knew the watching Ash put Ash's date of birth, phone unlocked for password protected. passcode to Ash's their password into and it worked.” P46 just a few minutes, However, they disabled the phone since Ash the phone over the and trusted Val password protection at was trusting and last few weeks.” P2 enough to not some point, because the believed they had betray them in this screen kept timing out nothing to hide” way.” P45 when using a GPS program P84 while driving.” P89 None of the above, or not enough information to Val Ash decide.

  16. What did Val do once they gained access? Val inspected archives of Val inspected archives of Val inspected social media Val did one of 18 other types non-public conversations in visual media , such as photo activity of actions text form , such as text galleries messages, emails, instant messages, or chats Val Ash

  17. Making sense of incidents ● Close reading of stories ● Reflexive process of finding latent meanings Outcome: two themes

  18. Trust as performative vulnerability “ Ash had nothing to hide but feared not being trusted if they kept their phone with them at all times” - P43 “ Val was suspicious. Ash would take their smartphone everywhere including when they were showering. Ash would turn their smartphone off if they had to leave it in a room with Val.” - P75 Val Ash

  19. Trust as performative vulnerability “Ash discovered what had been done to their phone from unusual battery consumption. It was the end of their relationship. ” - P1 “Ash found out about what Val did by new apps being open, and the phone being in a different place. Consequentially, Ash and Val are no longer roommates, and do no longer talk. ” – P45 Val Ash

  20. Self-serving sensemaking “Val is the controlling type ” - P2 “Val is quite possessive ” - P5 “Val is a lunatic ” - P69 “Val has a mind which works in a suspicious manner” - P40 Ash

  21. Self-serving sensemaking “Val is the controlling type ” - P2 “ Val caught Ash in their bedroom talking on telephone at 3AM” - P53 “Val is quite possessive ” - P5 “ Val was worried because Ash received many texts in the last days” - P101 “Val is a lunatic ” - P69 “Val started to think about how Ash had “Val has a mind which works in a suspicious seemed distant lately” - P37 manner” - P40 Ash Val

  22. What are incidents of unauthorized physical access to smartphones involving people known to each other like?

  23. When considering user-facing security technologies: Model for the possibility of non-stranger access

  24. A “showertime attack”

Recommend


More recommend