{"title":"为嵌入oauth - webview的移动应用程序提出和测试新的安全提示设计","authors":"Fadi Mohsen, Mohamed Shehab","doi":"10.1109/CIC.2017.00063","DOIUrl":null,"url":null,"abstract":"Today, many online service providers use the WebView-OAuth implementation in their Software Development Kits (SDKs) to seamlessly integrate their services into mobile applications. This approach was proven to be a target to JavaScript injection attacks that could lead into users losing their credentials or tricked into authorizing suspicious apps on their accounts. A number of solutions came out to countermeasure these attacks. However, the majority of these solutions do not involve the users in making the prevention decision and/or do not communicate the taken decision to them. That is because of two reasons: first, the focus of these works were mainly on detecting and preventing the attacks. Second, because of the lack of effective security cue designs for the WebView-based applications context. In this paper, we aim at investigating different security cue designs to aid with keeping the users informed of whatever these solutions are practicing. Finding an effective security cue design in the mobile browsers is challenging and more so for the WebView browsers. Thus, in this work, we are proposing and testing a number of security cue designs based on their understandability, noticeability, and effectiveness by conducting an online user study of 465 users. Our study found that some of the proposed security cue designs were truly noticeably, understandable and effective in alerting users of any suspicious activity. We highly recommend these security designs to be used by numerous security tools that detect and/or prevent WebView-based attacks.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications\",\"authors\":\"Fadi Mohsen, Mohamed Shehab\",\"doi\":\"10.1109/CIC.2017.00063\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, many online service providers use the WebView-OAuth implementation in their Software Development Kits (SDKs) to seamlessly integrate their services into mobile applications. This approach was proven to be a target to JavaScript injection attacks that could lead into users losing their credentials or tricked into authorizing suspicious apps on their accounts. A number of solutions came out to countermeasure these attacks. However, the majority of these solutions do not involve the users in making the prevention decision and/or do not communicate the taken decision to them. That is because of two reasons: first, the focus of these works were mainly on detecting and preventing the attacks. Second, because of the lack of effective security cue designs for the WebView-based applications context. In this paper, we aim at investigating different security cue designs to aid with keeping the users informed of whatever these solutions are practicing. Finding an effective security cue design in the mobile browsers is challenging and more so for the WebView browsers. Thus, in this work, we are proposing and testing a number of security cue designs based on their understandability, noticeability, and effectiveness by conducting an online user study of 465 users. Our study found that some of the proposed security cue designs were truly noticeably, understandable and effective in alerting users of any suspicious activity. We highly recommend these security designs to be used by numerous security tools that detect and/or prevent WebView-based attacks.\",\"PeriodicalId\":156843,\"journal\":{\"name\":\"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)\",\"volume\":\"88 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIC.2017.00063\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIC.2017.00063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications
Today, many online service providers use the WebView-OAuth implementation in their Software Development Kits (SDKs) to seamlessly integrate their services into mobile applications. This approach was proven to be a target to JavaScript injection attacks that could lead into users losing their credentials or tricked into authorizing suspicious apps on their accounts. A number of solutions came out to countermeasure these attacks. However, the majority of these solutions do not involve the users in making the prevention decision and/or do not communicate the taken decision to them. That is because of two reasons: first, the focus of these works were mainly on detecting and preventing the attacks. Second, because of the lack of effective security cue designs for the WebView-based applications context. In this paper, we aim at investigating different security cue designs to aid with keeping the users informed of whatever these solutions are practicing. Finding an effective security cue design in the mobile browsers is challenging and more so for the WebView browsers. Thus, in this work, we are proposing and testing a number of security cue designs based on their understandability, noticeability, and effectiveness by conducting an online user study of 465 users. Our study found that some of the proposed security cue designs were truly noticeably, understandable and effective in alerting users of any suspicious activity. We highly recommend these security designs to be used by numerous security tools that detect and/or prevent WebView-based attacks.