Zinaida Benenson’s research while affiliated with Friedrich-Alexander-University Erlangen-Nürnberg and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (84)


Understanding Strategies and Challenges of Timestamp Tampering for Improved Digital Forensic Event Reconstruction
  • Conference Paper

April 2025

·

5 Reads

Céline Vanini

·

Jan Gruber

·

·

[...]

·


"My Whereabouts, my Location, it's Directly Linked to my Physical Security": An Exploratory Qualitative Study of Location-Dependent Security and Privacy Perceptions among Activist Tech Users
  • Preprint
  • File available

January 2025

·

3 Reads

Digital-safety research with at-risk users is particularly urgent. At-risk users are more likely to be digitally attacked or targeted by surveillance and could be disproportionately harmed by attacks that facilitate physical assaults. One group of such at-risk users are activists and politically active individuals. For them, as for other at-risk users, the rise of smart environments harbors new risks. Since digitization and datafication are no longer limited to a series of personal devices that can be switched on and off, but increasingly and continuously surround users, granular geolocation poses new safety challenges. Drawing on eight exploratory qualitative interviews of an ongoing research project, this contribution highlights what activists with powerful adversaries think about evermore data traces, including location data, and how they intend to deal with emerging risks. Responses of activists include attempts to control one's immediate technological surroundings and to more carefully manage device-related location data. For some activists, threat modeling has also shaped provider choices based on geopolitical considerations. Since many activists have not enough digital-safety knowledge for effective protection, feelings of insecurity and paranoia are widespread. Channeling the concerns and fears of our interlocutors, we call for more research on how activists can protect themselves against evermore fine-grained location data tracking.

Download

Figure 1: Artificial sequence of events 1 − 4 imagined for the tampering task.
Catalog of Windows artifacts derived from Plaso parsers.
Strategies and Challenges of Timestamp Tampering for Improved Digital Forensic Event Reconstruction (extended version)

December 2024

·

30 Reads

·

1 Citation

Timestamps play a pivotal role in digital forensic event reconstruction, but due to their non-essential nature, tampering or manipulation of timestamps is possible by users in multiple ways, even on running systems. This has a significant effect on the reliability of the results from applying a timeline analysis as part of an investigation. In this paper, we investigate the problem of users tampering with timestamps on a running (``live'') system. While prior work has shown that digital evidence tampering is hard, we focus on the question of \emph{why} this is so. By performing a qualitative user study with advanced university students, we observe, for example, a commonly applied multi-step approach in order to deal with second-order traces (traces of traces). We also derive factors that influence the reliability of successful tampering, such as the individual knowledge about temporal traces, and technical restrictions to change them. These insights help to assess the reliability of timestamps from individual artifacts that are relied on for event reconstruction and subsequently reduce the risk of incorrect event reconstruction during investigations.





I Blame Apple in Part for My False Expectations: An Autoethnographic Study of Apple's Lockdown Mode in iOS

November 2024

·

13 Reads

Lockdown Mode was introduced in 2022 as a hardening setting for Apple's operating systems, designed to strengthen the protection against ``some of the most sophisticated digital threats''. However, Apple never explained these threats further. We present the first academic exploration of Lockdown Mode based on a 3-month autoethnographic study. We obtained a nuanced understanding of user experience and identified issues that can be extrapolated to larger user groups. The lack of information from Apple about the underlying threat model and details on affected features may hinder adequate assessment of Lockdown Mode, making informed decisions on its use challenging. Besides encountering undocumented restrictions, we also experienced both too much and too little visibility of protection during Lockdown Mode use. Finally, we deem the paternalistic security approach by Apple's Lockdown Mode harmful, because without detailed knowledge about technical capabilities and boundaries, at-risk users may be lulled into a false sense of security.


From Chaos to Consistency: The Role of CSAF in Streamlining Security Advisories

August 2024

Security advisories have become an important part of vulnerability management. They can be used to gather and distribute valuable information about vulnerabilities. Although there is a predefined broad format for advisories, it is not really standardized. As a result, their content and form vary greatly depending on the vendor. Thus, it is cumbersome and resource-intensive for security analysts to extract the relevant information. The Common Security Advisory Format (CSAF) aims to bring security advisories into a standardized format which is intended to solve existing problems and to enable automated processing of the advisories. However, a new standard only makes sense if it can benefit users. Hence the questions arise: Do security advisories cause issues in their current state? Which of these issues is CSAF able to resolve? What is the current state of automation? To investigate these questions, we interviewed three security experts, and then conducted an online survey with 197 participants. The results show that problems exist and can often be traced back to confusing and inconsistent structures and formats. CSAF attempts to solve precisely these problems. However, our results show that CSAF is currently rarely used. Although users perceive automation as necessary to improve the processing of security advisories, many are at the same time skeptical. One of the main reasons is that systems are not yet designed for automation and a migration would require vast amounts of resources.


On NVD Users’ Attitudes, Experiences, Hopes and Hurdles

August 2024

·

2 Reads

Digital Threats Research and Practice

The National Vulnerability Database (NVD) is a major vulnerability database that is free to use for everyone. It provides information about vulnerabilities and further useful resources such as linked advisories and patches. The NVD is often considered as the central source for vulnerability information and as a help to improve the resource-intensive process of vulnerability management. Although the NVD receives much public attention, little is known about its usage in vulnerability management, users’ attitudes towards it and whether they encounter any problems during usage. We explored these questions using a preliminary interview study with seven people, and a follow-up survey with 71 participants. The results show that the NVD is consulted regularly and often aids decision making. Generally, users are positive about the NVD and perceive it as a helpful, clearly structured tool. But users also faced issues: missing or incorrect entries, incomplete descriptions or incomprehensible CVSS ratings. In order to identify the problems origins, we discussed the results with two senior NVD members. Many of the problems can be attributed to higher-level problems such as the CVE List or limited resources. Nevertheless, the NVD is working on improving existing problems.


On NVD Users' Attitudes, Experiences, Hopes and Hurdles

August 2024

The National Vulnerability Database (NVD) is a major vulnerability database that is free to use for everyone. It provides information about vulnerabilities and further useful resources such as linked advisories and patches. The NVD is often considered as the central source for vulnerability information and as a help to improve the resource-intensive process of vulnerability management. Although the NVD receives much public attention, little is known about its usage in vulnerability management, users' attitudes towards it and whether they encounter any problems during usage. We explored these questions using a preliminary interview study with seven people, and a follow-up survey with 71 participants. The results show that the NVD is consulted regularly and often aids decision making. Generally, users are positive about the NVD and perceive it as a helpful, clearly structured tool. But users also faced issues: missing or incorrect entries, incomplete descriptions or incomprehensible CVSS ratings. In order to identify the problems origins, we discussed the results with two senior NVD members. Many of the problems can be attributed to higher-level problems such as the CVE List or limited resources. Nevertheless, the NVD is working on improving existing problems.


Citations (55)


... Generating the CVSS vector (and consequently CVSS scores) from CVEs is a demanding task for analysts [1]. Not only the number of CVEs has increased by 38% from 2023 to 2024 [2], but the final score can also differ based on the subjective nature of some of the CVSS vector, such as the level of confidentiality, integrity, and availability risk. ...

Reference:

Can LLMs Classify CVEs? Investigating LLMs Capabilities in Computing CVSS Vectors
Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities
  • Citing Conference Paper
  • May 2024

... Similar to other phishing-related studies that used role-play in their study design [1], [23], [63], we designed the role-play scenario and the emails to be realistic and to match the participants as closely as possible. In fact, we used real phishing emails, real legitimate emails, and real phishing URLs for the study and adapted them to suit the given scenario. ...

Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks
  • Citing Conference Paper
  • April 2023

... However, in today's fast-paced technological era, videos have emerged as the most informative medium among all types of multimedia, serving various users, including business and home users. They serve various practical purposes, including education, communication, entertainment, analytics, dynamic scientific visualization/analytics, surveillance, advertising, and video conferencing [2]. Platforms like Google and YouTube offer solutions to various queries and problems, with video tutorials becoming preferred over lengthy textual explanations due to time constraints. ...

Interplay of Security, Privacy and Usability in Videoconferencing
  • Citing Conference Paper
  • April 2023

... The ACPO method is used Interrelated to every stage that is shown on Figure 2. The planning stage processes preparing plans for research, obtaining maximum results, and increasing success. This stage prepares research tools and materials, such as hardware and software [32]. The capture stage aims to obtain evidence related to the investigation case. ...

Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations
  • Citing Article
  • September 2022

Forensic Science International Digital Investigation

... Soleymanian et al. [3] analyze costs and benefits of a UBI program based on real-world usage data (but without contact with the users). Quintero et al. [5] conduct a qualitative study on usability and user acceptance of UBI. Although in 2020, the UBI market size exceeded USD 30 billion, and it is expected to grow by over 20% until 2027 [6], UBI acceptance has not been studied in depth from the consumers' perspective. ...

Acceptance Factors of Car Insurance Innovations: The Case of Usage-Based Insurance

Journal of Traffic and Logistics Engineering

... Firstly, the userlevel data analyzed in these studies are not publicly available 1 . This lack of available data limits opportunities to further research fingerprinting risks, as noted by other researchers [50,52]. This also limits comparing results from the various studies, or evaluating how effectively browser developments have curtailed fingerprinting. ...

Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective

Proceedings on Privacy Enhancing Technologies

... In both cases, substantial amounts of sensitive information is collected. Consumers may not only fear data leakage outside the insurance company, but may also be reluctant to allow someone from the insurance company to monitor their behaviour (Quintero, Benenson, 2019). That, in turn, could hypothetically lead to a reduced acceptance rate of UBI. ...

Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View
  • Citing Conference Paper
  • September 2019

... However, if not limited to simple binary or graded labels, country-of-origin information can provide important information to consumers. For example, integrating additional security assurance measures by using either a multi-layer or descriptive label could reduce the dominance of country-of-origin signaling [7,35,46]. ...

Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products

... The role of CISOs shifted from being technical, IT-heavy [39], [40], [41], [42], to more of a leadership and governance oversight role [39], [40], [41], [42], [43], [44], [45], [46], [47]. A significant number of researchers tried to identify how CISOs should position themselves in their organizations, how they (should) collaborate with employees and management and what challenges CISOs still face when they try to integrate them into normal business processes [2], [41], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60]. The majority of research concludes that CISOs sit between the chairs and have trouble to be understood by other stakeholders. ...

Security Managers Are Not The Enemy Either
  • Citing Conference Paper
  • May 2019

... One of the biggest concerns facing the region in general is climate change [3]. Al-Razzaza Lake, which was chosen in this study, is one of the large low-lying lakes located on an area of 1810 square kilometers [4]. The main objective of the current study is to use GIS technology and data from remote sensing to estimate surface changes in the water area of Al-Razzaza Lake. ...

Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing: Methods and Protocols
  • Citing Chapter
  • January 2019

Lecture Notes in Computer Science