Towards usable security analysis tools for trigger-action programming

Show simple item record

dc.contributor.author McCall, McKenna
dc.contributor.author Zeng, Eric
dc.contributor.author Shezan, Faysal Hossain
dc.contributor.author Yang, Mitchell
dc.contributor.author Bauer, Lujo
dc.contributor.author Bichhawat, Abhishek
dc.contributor.author Cobb, Camille
dc.contributor.author Jia, Limin
dc.contributor.author Tian, Yuan
dc.contributor.other 19th Symposium on Usable Privacy and Security (SOUPS 2023)
dc.coverage.spatial United States of America
dc.date.accessioned 2024-01-03T14:43:59Z
dc.date.available 2024-01-03T14:43:59Z
dc.date.issued 2023-08-06
dc.identifier.citation McCall, McKenna; Zeng, Eric; Shezan, Faysal Hossain; Yang, Mitchell; Bauer, Lujo; Bichhawat, Abhishek; Cobb, Camille; Jia, Limin and Tian, Yuan, "Towards usable security analysis tools for trigger-action programming", in the 19th Symposium on Usable Privacy and Security (SOUPS 2023), Anaheim, US, Aug. 6-8, 2023.
dc.identifier.uri https://www.usenix.org/conference/soups2023/presentation/mccall
dc.identifier.uri https://repository.iitgn.ac.in/handle/123456789/9641
dc.description.abstract Research has shown that trigger-action programming (TAP) is an intuitive way to automate smart home IoT devices, but can also lead to undesirable behaviors. For instance, if two TAP rules have the same trigger condition, but one locks a door while the other unlocks it, the user may believe the door is locked when it is not. Researchers have developed tools to identify buggy or undesirable TAP programs, but little work investigates the usability of the different user-interaction approaches implemented by the various tools. This paper describes an exploratory study of the usability and utility of techniques proposed by TAP security analysis tools. We surveyed 447 Prolific users to evaluate their ability to write declarative policies, identify undesirable patterns in TAP rules (anti-patterns), and correct TAP program errors, as well as to understand whether proposed tools align with users' needs. We find considerable variation in participants' success rates writing policies and identifying anti-patterns. For some scenarios over 90% of participants wrote an appropriate policy, while for others nobody was successful. We also find that participants did not necessarily perceive the TAP anti-patterns flagged by tools as undesirable. Our work provides insight into real smart-home users' goals, highlights the importance of more rigorous evaluation of users' needs and usability issues when designing TAP security tools, and provides guidance to future tool development and TAP research.
dc.description.statementofresponsibility by McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia and Yuan Tian
dc.language.iso en_US
dc.title Towards usable security analysis tools for trigger-action programming
dc.type Conference Paper


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account