Just Make it Invisible to the User? A Case Study of Invisible Flash Drive Encryption

Authors: 

Jens Christian Opdenbusch, Konstantin Fischer, Jan Magnus Nold, and M. Angela Sasse, Ruhr University Bochum

Abstract: 

USB Flash drives are used in high-security contexts when networks are strongly separated. We conduct a task observation and interview study (n=14) to investigate problems users might face when a company deploys flash drive encryption software that is almost completely invisible to the user. We find a strong disparity between participants' knowledge of the flash drive encryption during the interviews and the observation of them interacting with it.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.