ABSTRACT
Browsers warn users when the privacy of an SSL/TLS connection might be at risk. An ideal SSL warning would empower users to make informed decisions and, failing that, guide confused users to safety. Unfortunately, users struggle to understand and often disregard real SSL warnings. We report on the task of designing a new SSL warning, with the goal of improving comprehension and adherence. We designed a new SSL warning based on recommendations from warning literature and tested our proposal with microsurveys and a field experiment. We ultimately failed at our goal of a well-understood warning. However, nearly 30% more total users chose to remain safe after seeing our warning. We attribute this success to opinionated design, which promotes safety with visual cues. Subsequently, our proposal was released as the new Google Chrome SSL warning. We raise questions about warning comprehension advice and recommend that other warning designers use opinionated design.
- Akhawe, D., and Felt, A. P. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In USENIX Security Symposium (2013). Google ScholarDigital Library
- Almuhimedi, H., Felt, A. P., Reeder, R. W., and Consolvo, S. Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning. In SOUPS (2014).Google Scholar
- Anderson, R. E., and Jolson, M. A. Technical wording in advertising: implications for market segmentation. Journal of Marketing 44 (1980).Google Scholar
- ANSI. Product safety signs and labels: Z535.4.Google Scholar
- Arron, J., Egans, R., and Mela, D. Paradoxical Effect of a Nutrition Labeling Scheme in a Student Cafeteria. Nutritional Research 15 (September 1995).Google Scholar
- Bauer, L., Bravo-Lillo, C., Cranor, L. F., and Fragkaki, E. Warning design guidelines (cmu-cylab-13-002).Google Scholar
- Biddle, R., van Oorschot, P., Patrick, A. S., Sobey, J., and Whalen, T. Browser interfaces and extended validation ssl certificates: an empirical study. In ACM Workshop on Cloud Computing Security (2009). Google ScholarDigital Library
- Braun, C. C., Greeno, B., and Silter, N. C. Differences in behavioral compliance as a function of warning color. In Human Factors and Ergonomics Society Annual Meeting (1998).Google Scholar
- Bravo-Lillo, C., Cranor, L., Komanduri, S., Schechter, S., and Sleeper, M. Harder to ignore?: Revisiting pop-up fatigue and approaches to prevent it. In SOUPS (2014).Google Scholar
- Bravo-Lillo, C., Cranor, L. F., Downs, J., and Komanduri, S. Bridging the gap in computer security warnings: A mental model approach. IEEE Security and Privacy 9, 2 (2011). Google ScholarDigital Library
- Bravo-Lillo, C., Cranor, L. F., Downs, J., Komanduri, S., Reeder, R. W., Schechter, S., and Sleeper, M. Your attention please: Designing security-decision uis to make genuine risks harder to ignore. In SOUPS (2013). Google ScholarDigital Library
- Breznitz, S. Cry Wolf: The Psychology of False Alarms.Google Scholar
- Bzostek, J. A., and Wogalter, M. S. Measuring visual search time for a product warning label as a function of icon, color, column, and vertical placement. In Human Factors and Ergonomics Society Annual Meeting (1999).Google ScholarCross Ref
- Dhamija, R., Tygar, J. D., and Hearst, M. A. Why phishing works. In CHI (2006). Google ScholarDigital Library
- Edworthy, J., and Adams, A. Warning design: a research perspective. Taylor and Francis, 1996.Google Scholar
- Egelman, S., Cranor, L. F., and Hong, J. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI (2008). Google ScholarDigital Library
- Egelman, S., and Schechter, S. The importance of being earnest {in security warnings}. In Financial Cryptography and Data Security, Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013.Google ScholarCross Ref
- Felt, A. P., Reeder, R. W., Almuhimedi, H., and Consolvo, S. Experimenting At Scale With Google Chrome's SSL Warning. In CHI (2014). Google ScholarDigital Library
- Fischhoff, B., Riley, D., Kovacs, D. C., and Small, M. What information belongs in a warning? Psychology Marketing 15, 7 (1998).Google ScholarCross Ref
- Frantz, J. P. Effect of location and procedural explicitness on user process of and compliance with product warnings. Human Factors 36 (1994).Google Scholar
- Frutiger, A. Signs and symbols: their design and meaning. Von Nostrand Reinhold, 1989.Google Scholar
- Glover, B. L., and Wogalter, M. S. Using a computer simulated world to study behavior compliance with warnings: effect of salience and gender. In Human Factors Society Annual Meeting (1997).Google Scholar
- Hancock, H., Bowles, C. T., Rogers, W. A., and Fisk, A. D. Comprehension and retention of warning information. Handbook of warnings (2006).Google Scholar
- Hartley, J. Designing instructional text, 3 ed. Kagan Page and Nichols, 1994.Google Scholar
- Kalsher, M. J., Wogalter, M. S., and Racicot, B. M. Pharmaceutical container labels and warnings: preference and perceived readability of alternative designs and pictorials. International Journal of Industrial Ergonomics 18 (1996).Google Scholar
- Laughery, K. R., and Stanush, J. A. Effects of warning explicitness on product perceptions. In Human Factors Society (1989).Google ScholarCross Ref
- Laughery, K. R., and Vaubel, K. P. Explicitness in consequence information in warnings. Safety Science 16 (1993).Google Scholar
- Laughery, K. R., Young, S. L., Vaubel, K. P., and Brelsford, J. W. The noticeability of warnings on alcoholic beverage containers. Journal of Public Policy and Marketing 12 (1993).Google Scholar
- McDonald, P., Mohebbi, M., and Slatkin, B. Comparing Google Consumer Surveys to Existing Probability and Non-Probability Based Internet Survey. In Google Whitepaper (2012).Google Scholar
- McLaughlin, G. H. Smog grading -- a new readability formula. Journal of Reading (1969).Google Scholar
- Morrow, D. G., Hier, C. M., Mendard, W. E., and Leirer, V. O. Icons improve older and younger adults' comprehension of medication information. Journal of Gerontology: Psychological Sciences 53B (1998).Google Scholar
- Reeder, R., Kowalczyk, E. C., and Shostack, A. Poster: Helping engineers design NEAT security warnings. In SOUPS (2011).Google Scholar
- Research, P. A Comparison of Results from Surveys by the Pew Research Center and Google Consumer Surveys.Google Scholar
- Schechter, S. E., Dhamija, R., Ozment, A., and Fischer, I. The emperor's new security indicators. In IEEE Symposium on Security and Privacy (2007). Google ScholarDigital Library
- Schwanda-Sosik, V., Bursztein, E., , Consolvo, S., Huffaker, D. A., Kossinets, G., Liao, K., McDonald, P., and Sedley, A. Online Microsurveys for User Experience Research. In CHI (Extended Abstracts) (2014). Google ScholarDigital Library
- Silver, N., Leonard, D. C., Ponsi, K. A., and Wogalter, M. S. Warnings and purchase intentions for pest-control products. Forensic Reports 4 (1991).Google Scholar
- Sotirakopoulos, A., Hawkey, K., and Beznosov, K. On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings. In SOUPS (2011). Google ScholarDigital Library
- Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., and Cranor, L. F. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX Security Symposium (2009). Google ScholarDigital Library
- Thorley, P., Hellier, E., and Edworthy, J. Habituation effects in visual warnings. Contemporary ergonomics (2001).Google Scholar
- Trommelen, M. Effectiveness of explicit warnings. Safety Science 25 (1997).Google Scholar
Index Terms
- Improving SSL Warnings: Comprehension and Adherence
Recommendations
The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements
IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conferenceThe SSL and TLS infrastructure used in important protocols like HTTPs and IMAPs is built on an X.509 public-key infrastructure (PKI). X.509 certificates are thus used to authenticate services like online banking, shopping, e-mail, etc. However, it ...
Securing SSL Certificate Verification through Dynamic Linking
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityRecent discoveries of widespread vulnerabilities in the SSL/TLS protocol stack, particular with regard to the verification of server certificates, has left the security of the Internet's communications in doubt. Newly proposed SSL trust enhancements ...
Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityHTTPS error warnings are supposed to alert browser users to network attacks. Unfortunately, a wide range of non-attack circumstances trigger hundreds of millions of spurious browser warnings per month. Spurious warnings frustrate users, hinder the ...
Comments