For the Level 1 Qualifying Exam, PhD students develop a written survey and critique covering the breadth of a research area and give an oral presentation of the work. The students present a public seminar followed by a Q&A session with all the graduate faculty members about their research when they propose the list of prospective research articles. These seminars are public and students are especially encouraged to come learn about on-going research in the Department of Computer and Information Sciences. This public seminar is a background study of the student's proposed area of research. Please attend!
***Note that PhD students are required to attend, and attendance will be taken and counted towards annual performance evaluation. If you are not able to attend, please email me.***
Student: Cagri Arisoy
Advisor: Dr. Nitesh Saxena
Title: A Review of Behavioral and Neurophysiological Studies of User-Centered Security
Abstract:
Most web-based designs and applications incorporate user-centered security measures in today’s Internet. Proliferation of malicious activities and disinformation make the security of personal information on the web extremely important. However, when web security relies upon end users and their decision-making, it becomes paramount to investigate user behavior as it pertains to such user-centered security tasks. Human-oriented user behavior plays an important role in these tasks.
In this light, beyond traditional behavioral studies, the use of neuroscientific methods in user-centered security studies has emerged as a new direction and the results obtained via these methods may be more efficient due to higher reliability. In such studies, in addition to measuring users’ task performance, users’ neural activity is simultaneously measured during the course of the experiment. This new methodology can provide unique insights into user-centered security behavior that are not possible to elicit with task performance studies alone.
In this survey, we systematize user-centered behavioral studies published previously as well as neurophysiological studies that demonstrate how neuroimaging techniques can be used for studying the neural underpinnings of user-centered security. In the latter category, we investigate the studies using neuroscience techniques (e.g., EEG, fMRI, and fNIRS) and make a comparison by examining these methods used in detail. We also explore how these methods are used in user-security related subjects and what makes them different from one another in terms of feasibility, accuracy and consistency. Since neural signals have different meanings, how neural signals affect the user decision mechanism is another contribution of this study. Our survey targets two prominent user-centered security tasks of: (1) heeding security messages (e.g., SSL/TLS warnings or malware warnings), and (2) detecting real vs. fake artifacts (such as websites in phishing attacks and voices in deepfake attacks).
Dial-In Information
Meeting ID: 971 8992 3108
Passcode: 789488
One tap mobile
+13126266799,,97189923108# US (Chicago)
+16468769923,,97189923108# US (New York)
Dial by your location
+1 312 626 6799 US (Chicago)
+1 646 876 9923 US (New York)
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
+1 408 638 0968 US (San Jose)
Find your local number: https://uab.zoom.us/u/adaRa3VYYw
Wednesday, December 2, 2020 at 11:15am to 12:05pm
Virtual EventNo recent activity