2nd Workshop on Security Information Workers

All sessions will be held in Denver Ballroom 1–2 unless otherwise noted.
Papers are available for download below to registered attendees now and to everyone beginning June 22, 2016. Paper abstracts are available to everyone now. Copyright to the individual works is retained by the author[s].

Downloads for Registered Attendees

Attendee Files 
Workshop on Security Information Workers Paper Archive (ZIP)

 

Wednesday, June 22, 2016

7:30 am–8:30 am Wednesday

Continental Breakfast

Ballroom Foyer

8:30 am–8:50 am Wednesday
8:50 am–10:00 am Wednesday

Paper Session 1: Developer Security

How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert Views

Charles Weir and Awais Rashid, Lancaster University; James Noble, Victoria University

Programmers’ lack of knowledge and ability in secure development threatens everyone who uses mobile apps. There’s no consensus on how to empower app programmers to get that knowledge. Based on interviews with twelve industry experts we argue that the discipline of secure app development is still at an early stage. Only once industry and academia have produced effective app developer motivation and training approaches shall we begin to see the kinds of secure apps we need to combat crime and privacy invasions.

Available Media

What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool

Tyler W Thomas, Heather Lipford, and Bill Chu, University of North Carolina at Charlotte; Justin Smith and Emerson Murphy-Hill, North Carolina State University

Security vulnerabilities are often accidentally introduced as developers implement code. While there are a variety of existing tools to help detect security vulnerabilities, they are seldom used by developers due to the time or security expertise required. We are investigating techniques integrated within the IDE to help developers detect and mitigate security vulnerabilities. In previous work, we examined the questions developers ask when investigating security vulnerabilities with static analysis tools. With those questions as a lens, we now investigate our proposed approach of interactive static analysis. We evaluated the interactions and perceptions of professional developers as they interacted with warnings produced by our tool. Our results provide evidence that our approach e ectively communicates security vulnerability information to software developers and provides design guidance for such tools.

Available Media

Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development Team

Sven Türpe, Laura Kocksch, and Andreas Poller, Fraunhofer SIT

Many software vendors conduct or commission penetration testing of their products. In a penetration test security experts identify entry points for attacks in a software product. The audits can be an eye-opener for development teams: they realize that security requires much more attention. However, it is unclear what lasting bene fits developers can reap from penetration tests. We report from a one-year study of a penetration test and its aftermath at a major software vendor, and ask how an agile development team managed to incorporate the test findings. Results suggest that penetration tests improve developers' security awareness, but long-lasting change of development practices is hampered if security is not properly reflected in the communicative and collaborative structures of the organization, e.g. by a dedicated stakeholder. Based on our findings we suggest improvements to current penetration test consultancies by addressing communication and organizational factors in software development.

Available Media
10:00 am–10:30 am Wednesday

Break with Refreshments

Ballroom Foyer

10:30 am–12:00 pm Wednesday

Plenary Session

Towards Understanding and Improving IT Security Management

Kosta Beznosov, University of British Columbia

Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after security breaches. In order for technological solutions to provide effective support to IT security practitioners, tool developers need to understand better not only the technical, but also the human and organizational dimensions of IT security. This talk gives an overview of a multi-year empirically-driven investigation towards understanding and improving IT security management.

Question and answer session to follow.

Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after security breaches. In order for technological solutions to provide effective support to IT security practitioners, tool developers need to understand better not only the technical, but also the human and organizational dimensions of IT security. This talk gives an overview of a multi-year empirically-driven investigation towards understanding and improving IT security management.

Question and answer session to follow.

Available Media
12:00 pm–1:40 pm Wednesday

Lunch (on your own)

1:40 pm–3:00 pm Wednesday

Paper Session 2: Security Worker Experience

Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication

Flynn Wolf and Ravi Kuber, University of Maryland, Baltimore County; Adam J. Aviv, United States Naval Academy

Authentication on mobile devices is a research priority for the development of usable and trustworthy platforms. However, users may struggle to understand how to balance security and usability for the broad range of important data-driven social and financial transactions on their devices. This concern is especially prevalent in security information workers sensitized to mobile technology vulnerabilities by information about security risk. The purpose of this study is to better understand the mental models and practices of those security conscious users from academia, industry, and government, from an explorative qualitative approach, noting that mobile authentication studies have largely overlooked the mindset of users who have considered their behavior in terms of detailed knowledge of risk. A preliminary analysis of findings is presented in this paper. Participants described usability and situational impairment issues, and concern for data security arising from highly contextual combinations of technology and situational risk. Implications for development of security methods derived from these views are discussed, such as the need for authentication rigor to be driven by more contextualized understanding of task and location-based risk.

Available Media

The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers

Colin Wee and Masooda Bashir, University of Illinois Urbana–Champaign; Nasir Memon, New York University

How do workers within the field of cybersecurity perceive cybersecurity competitions? This study aims to address this question and investigate if competitions left a positive mark on the information security workers who participated in them. In this paper, we report on an online survey of current employees of the cybersecurity industry who had once participated in Cybersecurity Awareness Week, one of the most established cybersecurity competitions in the world. We examine their perceptions of the competition in general, the skills they learnt from the competition, and whether they felt the competition was beneficial to them. Data from 89 cybersecurity workers showed that competitions taught them useful skills related to their job, especially skills related to reverse engineering and analytic skills. Their competition experience was also a major influence in their career-decision making.

Available Media

Collaborative Data Analysis and Discovery for Cyber Security

Diane Staheli, Vincent Mancuso, Raul Harnasch, Cody Fulcher, Madeline Chmielinski, Adam Kearns, Stephen Kelly, and Era Vuksani, MIT Lincoln Laboratory

In this paper, we present the Cyber Analyst Real-Time Integrated Notebook Application (CARINA). CARINA is a collaborative investigation system that aids in decision making by co-locating the analysis environment with centralized cyber data sources, and providing next generation analysts with increased visibility to the work of others. In current generation cyber work, tools limit analyst’s ability to collaborate, often relying on individual record keeping which hinders their ability to reflect on their own work and transition analytic insights to others. While online collaboration technologies have been shown to encourage and facilitate information sharing and group decision making in multiple contexts, no such technology exists today in cyber. Using visualization and annotation, CARINA leverages conversation and ad hoc thought to coordinate decisions across an organization. CARINA incorporates features designed to incentivize positive information-sharing behaviors, and provides a framework for incorporating recommendation engines and other analytics to guide analysts in the discovery of related data or analyses. In this paper, we present the user research that informed the development of CARINA, discuss the functionality of the system, and outline potential use cases. We also discuss future research trajectories and implications for cyber researchers and practitioners.

Available Media
3:00 pm–3:30 pm Wednesday

Break with Refreshments

Ballroom Foyer

3:30 pm–5:00 pm Wednesday

Usable Security Lessons for Security Administrators

Brainstorming and discussion session.

5:15 pm–7:00 pm Wednesday

SOUPS 2016 Poster Session and Happy Hour

Colorado Ballroom A–E