Towards Human-Centric Endpoint Security

Jenny Blessing, Partha Das Chowdhury*, Maria Sameen, Ross Anderson, Joe Gardiner, Awais Rashid

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Abstract

In a survey of six widely used end-to-end encrypted messaging applications, we consider the post-compromise recovery process from the perspective of what security audit functions, if any, are in place to detect and recover from attacks. Our investigation reveals audit functions vary in the extent to which they rely on the end user. We argue developers should minimize dependence on users and view them as a residual, not primary, risk mitigation strategy. To provide robust communications security, E2EE applications need to avoid protocol designs that dump too much responsibility on naive users and instead make system components play an appropriate role.
Original languageEnglish
Title of host publicationSecurity Protocols XXVIII
Subtitle of host publication28th International Workshop
PublisherSpringer
ISBN (Electronic)9783031430336
ISBN (Print)9783031430329
Publication statusPublished - 21 Oct 2023

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Fingerprint

Dive into the research topics of 'Towards Human-Centric Endpoint Security'. Together they form a unique fingerprint.

Cite this