Poster: Security for the Common Man
نویسندگان
چکیده
Security for the Common Man (SCM) is a new approach for detecting hidden malware by identifying a legitimate reason for outbound traffic. This method is combined with an interface that encourages user involvement. Users know what they were doing online and when they were doing it. We believe this knowledge can improve automated detection systems. SCM identifies legitimate outbound sessions by establishing a causal chain of prior sessions. Malware communication stands out because there are no legitimate causal links. We use a clock-like nova visualization to show users their 24-hour online communication pattern with suspicious sessions highlighted. Additional information is provided to help users relate their view of events to the flagged sessions. We evaluated SCM by role-playing various user types (Worker, Shopper, and Teenager) to explore the causal relationships and the visualization patterns for each. The experiments uncovered a real world example that illustrates the detection of hidden malware. Keywords-malware detection, usable security, visualization.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملPoster: Mobile Security for Dummies: Designing Mobile Security Interfaces for the Non-Expert
متن کامل
Poster: User perception of usability and security of a mobile payment system
Mobile (feature) phone-based monetary transactions are common in the developing world, where there are millions of users in Africa and India. These mobile payment systems are often offered by network carriers acting as a clearing house for a small fee on each transaction. This payment system does not require the user having a bank account. Evaluations of these payment systems usability and secu...
متن کاملPoster Abstract: Lightweight Authentication Method for Controller Area Network
In the age of smart and connected vehicles, there are significant issues in providing security for in-vehicle networking. Many security efforts for in-vehicle networks are still insufficient to build a lightweight security mechanism. Typically, it comes from the limitations of Controller Area Network (CAN) protocol common to in-vehicle network. We propose a lightweight authentication method bas...
متن کاملPOSTER: Weighing in eHealth Security A Security and Privacy Study of Smart Scales
eHealth devices such as smart scales and wearable fitness trackers are a key part of many health technology solutions. However, these eHealth devices can be vulnerable to privacy and security related attacks. In this poster, we propose a security analysis framework for eHealth devices, called mH-PriSe, that will yield useful information for security analysts, vendors, health care providers, and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012