Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2014
DOI: 10.4108/icst.collaboratecom.2014.257242
|View full text |Cite
|
Sign up to set email alerts
|

Role-Playing Game for Studying User Behaviors in Security: A Case Study on Email Secrecy

Abstract: Abstract-Understanding the capabilities of adversaries (e.g., how much the adversary knows about a target) is important for building strong security defenses. Computing an adversary's knowledge about a target requires new modeling techniques and experimental methods. Our work describes a quantitative analysis technique for modeling an adversary's knowledge about private information at workplace. Our technical enabler is a new emulation environment for conducting user experiments on attack behaviors. We develop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 34 publications
0
1
0
Order By: Relevance
“…rather than day-to-day activities which are more dynamic and is the focus of our work. Similarly, another work [18] used email activities to generate challenge questions (e.g., who sent you the most emails?). While Choi et al [19] presented an authentication method by utilizing users' geo-temporal history to generate questions, this work does not provide any quantitative evaluation regarding user performance and also does it evaluate the system against various attackers in real-life.…”
Section: Related Workmentioning
confidence: 99%
“…rather than day-to-day activities which are more dynamic and is the focus of our work. Similarly, another work [18] used email activities to generate challenge questions (e.g., who sent you the most emails?). While Choi et al [19] presented an authentication method by utilizing users' geo-temporal history to generate questions, this work does not provide any quantitative evaluation regarding user performance and also does it evaluate the system against various attackers in real-life.…”
Section: Related Workmentioning
confidence: 99%