Show simple item record

A Systematic Evaluation of System-level Threats and User Perceptions on Data Security and Privacy

dc.contributor.authorIbdah, Duha
dc.contributor.advisorBacha, Anys
dc.date.accessioned2022-08-12T18:05:46Z
dc.date.issued2022-08-24
dc.date.submitted2022-07-18
dc.identifier.urihttps://hdl.handle.net/2027.42/174096
dc.description.abstractAn immense amount of data is produced every day thus creating a global digital economy that relies primarily on this data. This provokes misconduct in the form of threats to data security and privacy. For instance, adversaries are motivated to extract user data targeting personal devices on their way to compromising data confidentiality and evading detection. Thus compromising lower levels of the computing stack is attractive to attackers since malware that resides in layers that span firmware and hardware are notoriously difficult to detect and remove. On the other hand, online service providers are aggressively evolving the digital systems around us into surveillance platforms. From voice assistants that listen to every conversation, to apps that share sensitive location information, privacy experts have raised concerns about how such data is being abused. Such behavior raises concerns about how service providers leverage privacy policies to legitimately appropriate private data. In this work, we explore the risks associated with application security in the presence of untrusted firmware. We present a novel firmware attack that leverages system management cycles to covertly collect data from the application layer. We show that system interrupts that are used for managing the platform, can be leveraged to extract sensitive application data from outgoing requests even when the HTTPS protocol is used. We evaluate the robustness of our attack under diverse and stressful application usage condition. Furthermore, we examine user attitudes and perceptions towards privacy policies as the legal contract governing data privacy. We analyze user perceptions based on data collected from 655 participants. We use this information to identify different motivators and blockers that can influence the user’s willingness towards reading privacy policies. We also examine the impact of previous user experiences such as cyber attacks, as well as, online data sharing practices on reading such policies. Moreover, we evaluate the ability of users to comprehend the content presented in privacy policies and the impact technical jargon has on the readability of such documents.en_US
dc.language.isoen_USen_US
dc.subjectData securityen_US
dc.subjectData privacyen_US
dc.subjectFirmwareen_US
dc.subjectPrivacy policyen_US
dc.subject.otherComputer and Information Scienceen_US
dc.titleA Systematic Evaluation of System-level Threats and User Perceptions on Data Security and Privacyen_US
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineCollege of Engineering & Computer Scienceen_US
dc.description.thesisdegreegrantorUniversity of Michigan-Dearbornen_US
dc.contributor.committeememberAbouelenien, Mohamed
dc.contributor.committeememberGuo, Jinhua
dc.contributor.committeememberMalik, Hafiz
dc.identifier.uniqname49335367en_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/174096/1/Duha Ibdah Final Dissertation.pdf
dc.identifier.doihttps://dx.doi.org/10.7302/5827
dc.identifier.orcid0000-0001-9011-296Xen_US
dc.description.filedescriptionDescription of Duha Ibdah Final Dissertation.pdf : Dissertation
dc.identifier.name-orcidIbdah, Duha; 0000-0001-9011-296Xen_US
dc.working.doi10.7302/5827en_US
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.