TY - GEN
T1 - OTO
T2 - 2012 ACM Conference on Computer and Communications Security, CCS 2012
AU - Kim, Tiffany Hyun Jin
AU - Gupta, Payas
AU - Han, Jun
AU - Owusu, Emmanuel
AU - Hong, Jason
AU - Perrig, Adrian
AU - Gao, Debin
PY - 2012
Y1 - 2012
N2 - Malware continues to thrive on the Internet. Besides automated mechanisms for detecting malware, we provide users with trust evidence information to enable them to make informed trust decisions. To scope the problem, we study the challenge of assisting users with judging the trustworthiness of software downloaded from the Internet. Through expert elicitation, we deduce indicators for trust evidence, then analyze these indicators with respect to scalability and robustness. We design OTO, a system for communicating these trust evidence indicators to users, and we demonstrate through a user study the effectiveness of OTO, even with respect to IE's SmartScreen Filter (SSF). The results from the between-subjects experiment with 58 participants confirm that the OTO interface helps people make correct trust decisions compared to the SSF interface regardless of their security knowledge, education level, occupation, age, or gender.
AB - Malware continues to thrive on the Internet. Besides automated mechanisms for detecting malware, we provide users with trust evidence information to enable them to make informed trust decisions. To scope the problem, we study the challenge of assisting users with judging the trustworthiness of software downloaded from the Internet. Through expert elicitation, we deduce indicators for trust evidence, then analyze these indicators with respect to scalability and robustness. We design OTO, a system for communicating these trust evidence indicators to users, and we demonstrate through a user study the effectiveness of OTO, even with respect to IE's SmartScreen Filter (SSF). The results from the between-subjects experiment with 58 participants confirm that the OTO interface helps people make correct trust decisions compared to the SSF interface regardless of their security knowledge, education level, occupation, age, or gender.
UR - http://www.scopus.com/inward/record.url?scp=84869390901&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84869390901&partnerID=8YFLogxK
U2 - 10.1145/2382196.2382239
DO - 10.1145/2382196.2382239
M3 - Conference contribution
AN - SCOPUS:84869390901
SN - 9781450316507
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 391
EP - 403
BT - CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security
Y2 - 16 October 2012 through 18 October 2012
ER -