Understanding the Weaknesses of Human-Protocol Interaction

نویسندگان

  • Marcelo Carlomagno Carlos
  • Geraint Price
چکیده

A significant number of attacks on systems are against the non-cryptographic components such as the human interaction with the system. In this paper, we propose a taxonomy of human-protocol interaction weaknesses. This set of weaknesses presents a harmonization of many findings from different research areas. In doing so we collate the most common human-interaction problems that can potentially result in successful attacks against protocol implementations. We then map these weaknesses onto a set of design recommendations aimed to minimize those weaknesses.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of the Humanity Research Paradigms based on Analysis of Human – Environment Interaction

As claimed by many behavioral scientists, designing should be based on the knowledge of interaction between human and environment. Environmental quality is also created in the context in which humans interact with their environment. To achieve such quality, designers should develop appropriate models for explaining this relationship, and this requires an understanding of human nature and the en...

متن کامل

Establishment, Culture and Freezing of Human and Mouse Embryonic Stem Cells: a Protocol Guide

Studies of the biology of human embryonic stem cells (hES cells) have developed rapidly over the past nine years since the first reports of their derivation. They clearly offer enormous potential, not only for regenerative medicine, but also for drug discovery and toxicology, human developmental biology and cancer research. Realizing these potentials a better understanding of the fundamental as...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Construction and Analysis of Tissue-Specific Protein-Protein Interaction Networks in Humans

We have studied the changes in protein-protein interaction network of 38 different tissues of the human body. 123 gene expression samples from these tissues were used to construct human protein-protein interaction network. This network is then pruned using the gene expression samples of each tissue to construct different protein-protein interaction networks corresponding to different studied ti...

متن کامل

Exploring Language Learners’ Cognitive Processes in On-line ESP Courses via Think-aloud Protocol Analysis

The present study aims to investigate language learners’ cognitive processes in on-line ESP courses. Three modes of inquiry are used: think-aloud protocol analysis, screen capture analysis, and correlation analysis. The theoretical foundations for the evaluation of the cognitive aspect of Ferdowsi Univeristy of Mashhad E-learning System are drawn from cognitive load theory, cognitive apprentice...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012