Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks
Human errors in performing security-critical tasks are typically blamed on the complexity of those tasks. However, such errors can also occur because of (possibly unexpected) sensory distractions. A sensory distraction that produces negative effects can be abused by the adversary that controls the environment. Meanwhile, a distraction with positive effects can be artificially introduced to improve user performance.
The goal of this work is to explore the effects of visual stimuli on the performance of security-critical tasks. To this end, we experimented with a large number of subjects who were exposed to a range of unexpected visual stimuli while attempting to perform Bluetooth Pairing. Our results clearly demonstrate substantially increased task completion times and markedly lower task success rates. These negative effects are noteworthy, especially, when contrasted with prior results on audio distractions which had positive effects on performance of similar tasks. Experiments were conducted in a novel (fully automated and completely unattended) experimental environment. This yielded more uniform experiments, better scalability and significantly lower financial and logistical burdens. We discuss this experience, including benefits and limitations of the unattended automated experiment paradigm.
This research has been supported by NSF Grant CNS-1544373.
- 6.Harris, W., Stress, P.: The effects of intense noise stimulation and noxious stimulation upon perceptual performance. Ph.D. thesis, University of Southern California (1960)Google Scholar
- 8.Kaczmarek, T., Kobsa, A., Sy, R., Tsudik, G.: An unattended study of users performing security critical tasks under adversarial noise. In: Proceedings of the NDSS Workshop on Useable Security, pp. 14:1–14:12 (2015)Google Scholar
- 9.Kainda, R., Flechais, I., Roscoe, A.W.: Usability and security of out-of-band channels in secure device pairing protocols. In: Proceedings of the 5th Symposium on Usable Privacy and Security, pp. 11:1–11:12 (2009). ACM ID: 1572547Google Scholar
- 10.Kline, D.W., Schieber F.: Vision and aging (1985)Google Scholar
- 11.Kobsa, A., Sonawalla, R., Tsudik, G., Uzun, E., Wang, Y.: Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 5th Symposium on Usable Privacy and Security, pp. 10:1–10:12 (2009). ACM ID: 1572546Google Scholar
- 13.Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. Cryptology ePrint Archive, report 2005/424 (2005). http://eprint.iacr.org/
- 14.Lazem, S., Gracanin, D.: Social traps in second life. In: 2010 Second International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES), pp. 133–140, March 2010Google Scholar
- 15.Naz, K., Epps, H.: Relationship between color and emotion: a study of college students. Coll. Stud. J. 38(3), 396 (2004)Google Scholar
- 16.Nickerson, D.: History of the Munsell color system and its scientific application. J. Opt. Soc., 575–586 (1940)Google Scholar
- 17.Nithyanand, R., Saxena, N., Tsudik, G., Uzun, E.: Groupthink: usability of secure group association for wireless devices. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, pp. 331–340 (2010). ACM ID: 1864399Google Scholar
- 18.Ollesch, H., Heineken, E., Schulte, F.P.: Physical or virtual presence of the experimenter: psychological online-experiments in different settings. Int. J. Internet Sci. 1(1), 71–81 (2006)Google Scholar
- 23.Wyszecki, G., Stiles, W.S.: Color Science, vol. 8. Wiley, New York (1982)Google Scholar