𝔖 Scriptorium
✦   LIBER   ✦

📁

Socio-Technical Aspects in Security and Trust: 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers (Security and Cryptology)

✍ Scribed by Thomas Groß (editor), Luca Viganò (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
211
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020.

The 8 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions and are organized in the following topical sections: personality and behavior; behavior in face of adversaries; smart environments; decentralized systems and digital ledgers; and reflections on socio-technical aspects of security.

The Chapter “Statistical Reliability of 10 Years of Cyber Security User Studies” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.


✦ Table of Contents


Preface
Message from the Workshop Organizers
Organization
Contents
Personality and Behavior
How Can Personality Influence Perception on Security of Context-Aware Applications?
1 Introduction
2 Study Design
2.1 Motivating Scenario Example
2.2 Goal and Research Questions
2.3 Participant Selection
2.4 Hypothesis, Variables and Metrics
2.5 Web-Based Survey Implementation
2.6 Survey Validation and Conduction
3 Results
3.1 RQ1: How Do Service Consumers Perceive the Importance of Security of a Context-Aware Software Intensive System?
3.2 RQ2: Do the Personality Influence on the Importance Perceived of Security of Context-Aware Software Applications?
4 Threats to Validity
5 Related Work
6 Conclusions and Further Work
References
Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours
1 Introduction
2 Managing Security for an Ecosystem of Behaviours
2.1 Discouraging Malicious Security-Related Behaviours
2.2 Encouraging Positive Security-Related Behaviours
2.3 Risk Management for Systems of Behaviours
2.4 Existing Examples
2.5 Related Work
2.6 Synthesis of Sociotechnical Risk-Related Research
3 Framework for Precision in Sociotechnical Controls
3.1 Prevention and Preservation of Behaviours
3.2 Intersection of Behaviours to Prevent or Preserve
3.3 Identifying Lack of Precision in Risk Controls
3.4 Managing for the Precision of Risk Controls
4 Use Case—Online Abuse Controls for Social Media
4.1 Factors in Positive and Negative Behaviours
4.2 Risk Controls
4.3 Refining Risk Controls
5 Discussion
6 Conclusion
References
Behavior in Face of Adversaries
Natural Strategic Abilities in Voting Protocols
1 Introduction
2 Methodology
2.1 Modeling the Voting Process
2.2 Natural Strategic Ability
2.3 Natural Strategies and Their Complexity
3 Specification and Verification of Voting Properties Based on Natural Strategies
3.1 How to Specify Voter-Verifiability
3.2 Towards Dispute Resolution
3.3 Strategic-Epistemic Specifications
3.4 Receipt-Freeness
3.5 Using Verification Tools to Facilitate Analysis
4 Use Case Scenario: vVote
5 Models
5.1 Voter Model
5.2 Refinements of the Voter Model
5.3 Voting Infrastructure
5.4 Coercer Model
6 Strategies and Their Complexity
6.1 Strategies for the Voter
6.2 Counting Other Kinds of Resources
6.3 Natural Strategies for Coalitions
7 Automated Verification of Strategies
8 Conclusions
References
A Study of Targeted Telephone Scams Involving Live Attackers
1 Introduction
1.1 Social Engineering Study
1.2 Social Engineering Dataset
2 Telephone vs. Email Scams
3 Experimental Procedure
3.1 Ethical and Legal Concerns
4 Attack Scripts
4.1 Structure of a Script
4.2 Controlled and Uncontrolled Variables
5 Study Results
5.1 Demographics of the Participants
5.2 Success Rates
5.3 Hypotheses Tests
6 Discussion and Limitations
7 Telephone Scam Dataset
7.1 Transcript Examples
8 Related Work
8.1 Social Engineering Studies
8.2 Social Engineering Attack Datasets
9 Conclusion
References
Smart Environments
User Privacy Concerns and Preferences in Smart Buildings
1 Introduction
2 Methodology
2.1 Survey Design
2.2 Questionnaire Structure
2.3 Case Study
2.4 Questionnaire Distribution
2.5 Analysis Methods
2.6 Ethics
3 Evaluation
3.1 Results
3.2 Thematic Analysis
4 Discussion
4.1 Further Analysis
4.2 Recommendations
4.3 Limitations
5 Conclusion
A Questionnaire
A.1 Background Information
A.2 Views on Privacy
A.3 Awareness of USB Data Collection and Access
A.4 USB Privacy Concerns
A.5 Information Page
A.6 USB Privacy Concerns (Revisited)
A.7 Consent
References
Work in Progress: Towards Usable Updates for Smart Home Devices
1 Introduction
2 Related Work
2.1 User Update Behaviors
2.2 IoT Updates
3 Methodology
3.1 Participant Recruitment and Demographics
3.2 Data Collection and Analysis
4 Preliminary Results
4.1 Update Modes and Notifications
4.2 Update Purpose and Urgency
4.3 Uncertainty About Update Status
4.4 Updates to Apps vs. Updates to Devices
4.5 Update Concerns
4.6 Relationship to Security
5 Discussion
5.1 Comparison to Traditional Updates
5.2 Informing Usable Updates
6 Limitations and Planned Future Work
References
Decentralized Systems and Digital Ledgers
WARChain: Blockchain-Based Validation of Web Archives
1 Introduction
2 Related Works
3 Solution
4 Implementation
4.1 The EduPoS Blockchain
4.2 Validators
4.3 Crawler Simulator
5 Experiments
5.1 Experiment #1: Proof of Concept
5.2 Experiment #2: Validation
5.3 Experiment #3: Duplicate Detection
6 Conclusion and Future Work
References
Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums
1 Introduction
2 Background
2.1 User Studies
2.2 Dark Net Studies
3 Research Questions
4 Research Method
4.1 Data Collection Method
4.2 Sample Selection
4.3 Data Analysis
5 Ethics
6 Results and Analysis
6.1 It’s About Finality, Not Anonymity
6.2 Anonymity Isn’t Everything
6.3 The Payment Mechanism
6.4 Dark Nets Are Hard
7 Discussion
7.1 Implications for Policy
7.2 Limitations
8 Conclusion and Future Work
References
Self-Governing Public Decentralised Systems
1 Introduction
2 State of the Art
2.1 Proof-of-Work
2.2 Proof-of-Stake
2.3 Delegated Proof-of-Stake
2.4 Proof-of-Personhood
2.5 Proof-of-Authority
2.6 Voting On-Ledger' 3 Problem Motivation 4 Solution 4.1One Person/One Vote' in Delegated Proof-of-Stake
4.2 Establishing Personhood
5 Conclusion and Future Work
References
Reflections on Socio-Technical Aspects of Security
Statistical Reliability of 10 Years of Cyber Security User Studies
1 Introduction
2 Background
2.1 Statistical Inferences and Null Hypothesis Significance Testing
2.2 Effect Sizes and Confidence Intervals
2.3 Statistical Power
2.4 Research Biases
3 Related Works
3.1 Appraisal of the Field
3.2 Guidelines
4 Aims
5 Method
5.1 Sample
5.2 Procedure
6 Results
6.1 Sample
6.2 Effect Size Estimates and Their Confidence
6.3 Upper Bounds of Statistical Power
6.4 Power of Actual Tests
6.5 Publication Bias
6.6 The Winner's Curse
7 Discussion
7.1 Limitations
8 Concluding Recommendations
A Sample Characteristics
References
Privacy, Security and Trust in the Internet of Neurons
1 Introduction: From the Human Computer to... the Human Computer
2 The IoN: From brainwaves to packets, and Vice versa
3 Privacy, Security and Trust
3.1 System Model
3.2 Threat Model
3.3 Security Properties
4 Conclusions
References
Author Index


📜 SIMILAR VOLUMES


Socio-Technical Aspects in Security and
✍ Thomas Groß (editor), Theo Tryfonas (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissi

Socio-Technical Aspects in Security: 11t
✍ Simon Parkin (editor), Luca Viganò (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual eve

Information Security and Cryptology: 17t
✍ Yu Yu (editor), Moti Yung (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book constitutes the post-conference proceedings of the 17th International Conference on Information Security and Cryptology, Inscrypt 2021, in August 2021. Due the COVID-19, the conference was held online</span><p><span>The 28 full papers presented were carefully reviewed and selected fr

Computer Security: ESORICS 2020 Internat
✍ Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christ 📂 Library 📅 2021 🏛 Springer 🌐 English

This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third Intern

Formal Aspects of Security and Trust: 7t
✍ Dusko Pavlovic (auth.), Pierpaolo Degano, Sandro Etalle, Joshua Guttman (eds.) 📂 Library 📅 2011 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The

Formal Aspects of Security and Trust: 7t
✍ Dusko Pavlovic (auth.), Pierpaolo Degano, Sandro Etalle, Joshua Guttman (eds.) 📂 Library 📅 2011 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The