Zum Hauptinhalt springen

Showing 1–24 of 24 results for author: Aviv, A J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15308  [pdf, other

    cs.CR cs.HC

    Nudging Users to Change Breached Passwords Using the Protection Motivation Theory

    Authors: Yixin Zou, Khue Le, Peter Mayer, Alessandro Acquisti, Adam J. Aviv, Florian Schaub

    Abstract: We draw on the Protection Motivation Theory (PMT) to design nudges that encourage users to change breached passwords. Our online experiment ($n$=$1,386$) compared the effectiveness of a threat appeal (highlighting negative consequences of breached passwords) and a coping appeal (providing instructions on how to change the breached password) in a 2x2 factorial design. Compared to the control condit… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: Manuscript under review at ACM Transactions on Computer-Human Interaction

  2. arXiv:2312.13813  [pdf, other

    cs.CY cs.HC

    How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions?

    Authors: Florian M. Farke, David G. Balash, Maximilian Golla, Adam J. Aviv

    Abstract: Data dashboards are designed to help users manage data collected about them. However, prior work showed that exposure to some dashboards, notably Google's My Activity dashboard, results in significant decreases in perceived concern and increases in perceived benefit from data collection, contrary to expectations. We theorize that this result is due to the fact that data dashboards currently do not… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: 19 pages, 11 figures, to be published in Proceedings on Privacy Enhancing Technologies (PoPETs) 2024 Issue 2

  3. arXiv:2306.17063  [pdf, other

    cs.CR

    Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies

    Authors: Mir Masood Ali, David G. Balash, Monica Kodwani, Chris Kanich, Adam J. Aviv

    Abstract: Apple introduced privacy labels in Dec. 2020 as a way for developers to report the privacy behaviors of their apps. While Apple does not validate labels, they also require developers to provide a privacy policy, which offers an important comparison point. In this paper, we fine-tuned BERT-based language models to extract privacy policy features for 474,669 apps on the iOS App Store, comparing the… ▽ More

    Submitted 16 June, 2024; v1 submitted 29 June, 2023; originally announced June 2023.

    Comments: Proceedings on Privacy Enhancing Technologies Symposium (PoPETS) 2024

  4. arXiv:2302.12936  [pdf, other

    cs.CY cs.CR cs.HC

    Educators' Perspectives of Using (or Not Using) Online Exam Proctoring

    Authors: David G. Balash, Rahel A. Fainchtein, Elena Korkes, Miles Grant, Micah Sherr, Adam J. Aviv

    Abstract: The onset of the COVID-19 pandemic changed the landscape of education and led to increased usage of remote proctoring tools that are designed to monitor students when they take assessments outside the classroom. While prior work has explored students' privacy and security concerns regarding online proctoring tools, the perspective of educators is under explored. Notably, educators are the decision… ▽ More

    Submitted 24 February, 2023; originally announced February 2023.

    Comments: Extended version of conference paper in the proceedings of the 32nd USENIX Security Symposium. USENIX Sec'. Aug. 2023

  5. arXiv:2206.02658  [pdf, other

    cs.CR

    Longitudinal Analysis of Privacy Labels in the Apple App Store

    Authors: David G. Balash, Mir Masood Ali, Xiaoyuan Wu, Chris Kanich, Adam J. Aviv

    Abstract: In December of 2020, Apple started to require app developers to self-report privacy label annotations on their apps indicating what data is collected and how it is used.To understand the adoption and shifts in privacy labels in the App Store, we collected nearly weekly snapshots of over 1.6 million apps for over a year (July 15, 2021 -- October 25, 2022) to understand the dynamics of privacy label… ▽ More

    Submitted 29 March, 2023; v1 submitted 6 June, 2022; originally announced June 2022.

  6. arXiv:2111.03573  [pdf, other

    cs.CR

    Security and Privacy Perceptions of Third-Party Application Access for Google Accounts (Extended Version)

    Authors: David G. Balash, Xiaoyuan Wu, Miles Grant, Irwin Reyes, Adam J. Aviv

    Abstract: Online services like Google provide a variety of application programming interfaces (APIs). These online APIs enable authenticated third-party services and applications (apps) to access a user's account data for tasks such as single sign-on (SSO), calendar integration, and sending email on behalf of the user, among others. Despite their prevalence, API access could pose significant privacy and sec… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

  7. "I have no idea what they're trying to accomplish:" Enthusiastic and Casual Signal Users' Understanding of Signal PINs

    Authors: Daniel V. Bailey, Philipp Markert, Adam J. Aviv

    Abstract: We conducted an online study with $n = 235$ Signal users on their understanding and usage of PINs in Signal. In our study, we observe a split in PIN management and composition strategies between users who can explain the purpose of the Signal PINs (56%; enthusiasts) and users who cannot (44%; casual users). Encouraging adoption of PINs by Signal appears quite successful: only 14% opted-out of sett… ▽ More

    Submitted 16 June, 2021; originally announced June 2021.

    Comments: To appear at Symposium on Usable Privacy and Security (SOUPS) 2021

    Journal ref: Symposium on Usable Privacy and Security 2021 (SOUPS '21)

  8. arXiv:2106.05917  [pdf

    cs.CR cs.HC

    Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services

    Authors: David G. Balash, Dongkun Kim, Darikia Shaibekova, Rahel A. Fainchtein, Micah Sherr, Adam J. Aviv

    Abstract: In response to the Covid-19 pandemic, educational institutions quickly transitioned to remote learning. The problem of how to perform student assessment in an online environment has become increasingly relevant, leading many institutions and educators to turn to online proctoring services to administer remote exams. These services employ various student monitoring methods to curb cheating, includi… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

  9. arXiv:2105.14619  [pdf, other

    cs.CR cs.HC

    Strategies and Perceived Risks of Sending Sensitive Documents

    Authors: Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv, Michelle L. Mazurek

    Abstract: People are frequently required to send documents, forms, or other materials containing sensitive data (e.g., personal information, medical records, financial data) to remote parties, sometimes without a formal procedure to do so securely. The specific transmission mechanisms end up relying on the knowledge and preferences of the parties involved. Through two online surveys ($n=60$ and $n=250$), we… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Comments: 25 pages, to appear in USENIX Security Symposium 2021

  10. arXiv:2105.14066  [pdf, other

    cs.CY cs.HC

    Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version)

    Authors: Florian M. Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, Adam J. Aviv

    Abstract: Privacy dashboards and transparency tools help users review and manage the data collected about them online. Since 2016, Google has offered such a tool, My Activity, which allows users to review and delete their activity data from Google services. We conducted an online survey with $n = 153$ participants to understand if Google's My Activity, as an example of a privacy transparency tool, increases… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  11. arXiv:2012.07944  [pdf, other

    cs.CR cs.NI

    Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services

    Authors: Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr, Stephen Ribaudo, Armaan Khullar

    Abstract: Smart DNS (SDNS) services advertise access to "geofenced" content (typically, video streaming sites such as Netflix or Hulu) that is normally inaccessible unless the client is within a prescribed geographic region. SDNS is simple to use and involves no software installation. Instead, it requires only that users modify their DNS settings to point to an SDNS resolver. The SDNS resolver "smartly" ide… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: To appear at: Rahel A. Fainchtein, Adam A. Aviv, Micah Sherr, Stephen Ribaudo, and Armaan Khullar. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2021

  12. arXiv:2010.01973  [pdf, other

    cs.CR cs.CY cs.HC

    Why Older Adults (Don't) Use Password Managers

    Authors: Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv

    Abstract: Password managers (PMs) are considered highly effective tools for increasing security, and a recent study by Pearman et al. (SOUPS'19) highlighted the motivations and barriers to adopting PMs. We expand these findings by replicating Pearman et al.'s protocol and interview instrument applied to a sample of strictly older adults (>60 years of age), as the prior work focused on a predominantly younge… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

  13. arXiv:2008.10697  [pdf, other

    cs.HC cs.CR

    Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond

    Authors: Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber

    Abstract: Personal Identification Numbers (PINs) are widely used as an access control mechanism for digital assets (e.g., smartphones), financial assets (e.g., ATM cards), and physical assets (e.g., locks for garage doors or homes). Using semi-structured interviews (n=35), participants reported on PIN usage for different types of assets, including how users choose, share, inherit, and reuse PINs, as well as… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.

  14. arXiv:2008.10681  [pdf, other

    cs.CR cs.HC

    Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns

    Authors: Timothy J. Forman, Adam J. Aviv

    Abstract: Android unlock patterns remain quite common. Our study, as well as others, finds that roughly 25\% of respondents use a pattern when unlocking their phone. Despite known security issues, the design of the pattern interface remains unchanged since first launch. We propose Double Patterns, a natural and easily adoptable advancement on Android unlock patterns that maintains the core design features,… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.

  15. Knock, Knock. Who's There? On the Security of LG's Knock Codes

    Authors: Raina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu

    Abstract: Knock Codes are a knowledge-based unlock authentication scheme used on LG smartphones where a user enters a code by tapping or "knocking" a sequence on a 2x2 grid. While a lesser used authentication method, as compared to PINs or Android patterns, there is likely a large number of Knock Code users; we estimate, 700,000--2,500,000 in the US alone. In this paper, we studied Knock Codes security aski… ▽ More

    Submitted 26 June, 2020; v1 submitted 5 June, 2020; originally announced June 2020.

    Journal ref: Symposium on Usable Privacy and Security 2020 (SOUPS '20)

  16. This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs

    Authors: Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv

    Abstract: In this paper, we provide the first comprehensive study of user-chosen 4- and 6-digit PINs (n=1220) collected on smartphones with participants being explicitly primed for device unlocking. We find that against a throttled attacker (with 10, 30, or 100 guesses, matching the smartphone unlock setting), using 6-digit PINs instead of 4-digit PINs provides little to no increase in security, and surpris… ▽ More

    Submitted 16 June, 2021; v1 submitted 10 March, 2020; originally announced March 2020.

    Comments: 15+3 pages, 9 figures, 8+5 tables

    Journal ref: IEEE Symposium on Security and Privacy 2020 (SP' 20)

  17. arXiv:1811.10548  [pdf, ps, other

    cs.CR cs.HC

    A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns

    Authors: Adam J. Aviv, Markus Duermuth

    Abstract: Android's graphical password unlock remains one of the most widely used schemes for phone unlock authentication, and it is has been studied extensively in the last decade since its launch. We have learned that users' choice of patterns mimics the poor password choices in other systems, such as PIN or text-based passwords. A wide variety of analysis and data collections methods was used to reach th… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

  18. arXiv:1809.08640  [pdf, ps, other

    cs.HC cs.CR

    Comparing Video Based Shoulder Surfing with Live Simulation

    Authors: Adam J. Aviv, Flynn Wolf, Ravi Kuber

    Abstract: We analyze the claims that video recreations of shoulder surfing attacks offer a suitable alternative and a baseline, as compared to evaluation in a live setting. We recreated a subset of the factors of a prior video-simulation experiment conducted by Aviv et al. (ACSAC 2017), and model the same scenario using live participants ($n=36$) instead (i.e., the victim and attacker were both present). Th… ▽ More

    Submitted 23 September, 2018; originally announced September 2018.

    Comments: This article appears in the 2018 Annual Computer Security Applications Conference. https://doi.org/10.1145/3274694.3274702

  19. arXiv:1805.12539  [pdf, ps, other

    cs.HC cs.CR

    Classifying Eyes-Free Mobile Authentication Techniques

    Authors: Flynn Wolf, Adam J. Aviv, Ravi Kuber

    Abstract: Mobile device users avoiding observational attacks and coping with situational impairments may employ techniques for eyes-free mobile unlock authentication, where a user enters his/her passcode without looking at the device. This study supplies an initial description of user accu- racy in performing this authentication behavior with PIN and pattern passcodes, with varying lengths and visual charac… ▽ More

    Submitted 31 May, 2018; originally announced May 2018.

    Comments: A version of this paper is to appear in the Journal of Information Security and Applications (JISA)

  20. arXiv:1801.07518  [pdf, other

    cs.CR cs.CY cs.HC

    Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication

    Authors: Adam J. Aviv, Ravi Kuber

    Abstract: In this study, we examine the ways in which user attitudes towards privacy and security relating to mobile devices and the data stored thereon may impact the strength of unlock authentication, focusing on Android's graphical unlock patterns. We conducted an online study with Amazon Mechanical Turk ($N=750$) using self-reported unlock authentication choices, as well as Likert scale agreement/disagr… ▽ More

    Submitted 1 February, 2018; v1 submitted 23 January, 2018; originally announced January 2018.

  21. Towards Baselines for Shoulder Surfing on Mobile Authentication

    Authors: Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber

    Abstract: Given the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the research community has investigated solutions to minimize or prevent the threat of shoulder surfing, our understanding of how the attack performs on current systems is less well studied. In this paper, we describe… ▽ More

    Submitted 23 September, 2017; v1 submitted 14 September, 2017; originally announced September 2017.

    Comments: Will appear in Annual Computer Security Applications Conference (ACSAC)

  22. Deterministic, Stash-Free Write-Only ORAM

    Authors: Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry

    Abstract: Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents of data and also hiding the pattern of write operations over that data. WoORAMs provide better privacy than plain encryption and better performance than more general ORAM schemes (which hide both writing and reading access patterns), and the write-oblivious setting has been applied to important applications of c… ▽ More

    Submitted 7 September, 2017; v1 submitted 12 June, 2017; originally announced June 2017.

    Journal ref: Proc. ACM Conf. on Computer and Communications Security (CCS) 2017

  23. arXiv:1605.09779  [pdf, other

    cs.CR

    ObliviSync: Practical Oblivious File Backup and Synchronization

    Authors: Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche

    Abstract: Oblivious RAM (ORAM) protocols are powerful techniques that hide a client's data as well as access patterns from untrusted service providers. We present an oblivious cloud storage system, ObliviSync, that specifically targets one of the most widely-used personal cloud storage paradigms: synchronization and backup services, popular examples of which are Dropbox, iCloud Drive, and Google Drive. This… ▽ More

    Submitted 2 December, 2016; v1 submitted 31 May, 2016; originally announced May 2016.

    Comments: 15 pages. Accepted to NDSS 2017

  24. arXiv:1505.07391  [pdf, other

    cs.CR cs.DS

    A Practical Oblivious Map Data Structure with Secure Deletion and History Independence

    Authors: Daniel S. Roche, Adam J. Aviv, Seung Geol Choi

    Abstract: We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the first ORAM to allow varying block sizes without trivial padding. We also present a new history-independent data structure (a HIRB tree) that can be stored within a vORAM. Together, this construction provides an efficient and practical oblivious data structure (ODS) for a key/value map, and goes further… ▽ More

    Submitted 20 November, 2015; v1 submitted 27 May, 2015; originally announced May 2015.