UserInteractionDesignforSecureSystemsKa-PingYee@zesty.caAbstract.Thesecurityofanycomputersystemthatisconguredorop-eratedbyhumanbeingscriticallydependsontheinformationconveyedbytheuserinterface,thedecisionsoftheusers,andtheinterpretationoftheiractions.Thispaperestablishessomestartingpointsforreasoningaboutsecurityfromauser-centredpointofview:itproposestomodelsystemsintermsofactorsandactions,andintroducestheconceptofthesubjectiveactor-abilitystate.Tenkeyprinciplesforsecureinteractiondesignareidentied;casestudiesillustrateandjustifytheprinciples,describingreal-worldproblemsandpossiblesolutions.Itishopedthatthisworkwillhelpguidethedesignandevaluationofsecuresystems.1IntroductionSecurityproblemsareoftenattributedtosoftwareerrorssuchasbueroverruns,raceconditions,orweakcryptosystems.Thishasfocusedagreatdealofattentiononassuringthecorrectnessofsoftwareimplementations.However,thecorrectuseofsoftwareisjustasimportantasthecorrectnessofthesoftwareitself.Forexample,thereisnothinginherentlyincorrectaboutaprogramthatdeletesles.Butwhensuchaprogramhappenstodeletelesagainstourwishes,weperceiveasecurityviolation.Inadierentsituation,theinabilitytocommandtheprogramtodeletelescouldalsobeaserioussecurityproblem.Itfollowsthatthesecuritypropertiesofanysystemcanonlybemeaningfullydiscussedinthecontextofthesystem'sexpectedbehaviour.GarnkelandSpaordgivethedenition:\Acomputerissecureifyoucandependonitanditssoftwaretobehaveasyouexpect[7].Noticethatthisdenitionisnecessarilydependentonthemeaningof\you,whichusuallyreferstotheuser.Itisimpossibletoevendescribesecuritywithoutaddressingtheuserperspective.Amongthemostspectacularofrecentsecurityproblemsaree-mailattach-mentviruses.Manyofthesearegoodreal-lifeexamplesofsecurityviolationsintheabsenceofsoftwareerrors:atnopointintheirpropagationdoesanyapplicationorsystemsoftwarebehavedierentlythanitsprogrammerswouldexpect.Thee-mailclientcorrectlydisplaysthemessageandcorrectlydecodestheattachment;thesystemcorrectlyexecutesthevirusprogramwhentheuseropenstheattachment.Rather,theproblemexistsbecausethefunctionallycorrectbehaviourisinconsistentwithwhattheuserwouldwant.Thispaperaimstomaketwomaincontributions:rst,itpresentsamodeltoguidethinkingaboutthistypeofissue;andsecond,itgivesspecicrecom-mendationsintheformofteninteractiondesignprinciplesforsecuresystems.Manydesignershabituallyassumethatimprovingsecuritynecessarilyde-gradesusability,andviceversa;thedecisionofwhethertofavouroneortheotheristypicallyseenasaregrettablecompromise.Forexample,acommonlysuggestedsecurityxistohavethecomputeraskforuserconrmation,yetwearealsooftenwarnedagainstannoyingtheuserbyaskingtoofrequently[14].Intheend,thesejudgementcallsareoftenmadearbitrarilybecausethereseemstobenogoodanswer.Acoherentmodelforsecureuserinteractioncanclarifythedesignprocessandhelpdesignersmakethesedecisionsconsistently.Itaketheapparentlyradicalpositionthatsecurityandusabilityarenotfundamentallyatoddswitheachother.Infact,itshouldbecomeclearuponreflectionthattheoppositemakesmoresense:asystemthatismoresecureismorecontrollable,morereliable,andhencemoreusable;amoreusablesystemreducesconfusionandisthusmorelikelytobesecure.Ingeneral,securityadvocatesandusabilityadvocatesbothwantthecomputertocorrectlydowhattheuserwants{nomoreandnoless1.Theresultspresentedherecomefromdiscussingdesignchallengesanduserexperiencesatlengthwithdesignersandusersofsoftwareintendedtobesecure.Aftermuchdebateandseveraliterationsofrenement,wehavetriedtodistillthemostproductivelinesofreasoningdowntoaconcisesetofdesignprinciplesthatcoversmanyoftheimportantandcommonfailuremodes.2RelatedWorkThereseemtoberelativelyfewdevelopmenteortsincomputersecurity[10][12][25]thathaveseriouslyemphasizeduserinteractionissues.TheAdageproject[25],auser-centredauthorizationservice,isprobablythelargestsucheorttodate.Therehavebeenseveralimportantusabilitystudiesofsecurityapplications[1][13][16][24],allofwhichhaveshownthedevastatingimpactthatignoringusabilityissuescanhaveontheeectivenessofsecuritymeasures.Tomyknowledge,thispaperistherstattempttoproposeastructuredframeworkfordesignthinkingandtosuggestwidelyapplicableguidelinesforsecureinteractiondesignasopposedtostudyingasingleapplicationormechanism.Simultaneouslyaddressingalltenofthedesignprinciplespresentedhereisadmittedlyasignicantdesignchallenge.Lesttheyseemtooidealistictobesatisablebyarealsystem,itisworthmentioningthatthereisanindependentlydevelopedworkingprototypeofasecuredesktopenvironment[3]thatlargelysucceedsinsatisfyingmostoftheprinciples.1Oftenadilemmastemsfromconflictsbetweenwhatdierentpeoplewant.Forexample,somedigitalrightsmanagementeortscurrentlyunderwaywouldmakemediacontenthardertouse.Theyaredescribedassecurityimprovements,buttheresultingconflictisnotoneofsecurityversususability:itisactuallyaconflictbetweenthedesiresofusersandcontentdistributors.Balancingsuchconflictsisindeedanimportantproblem,butitisoutsideofthescopeofthispaper.Althoughwewillnotaddressthedesignofsystemsthatservetwomasters,understandinghowtoserveon