TU Darmstadt / ULB / TUbiblio

A Pattern for Secure Graphical User Interface Systems

Fischer, Thomas and Sadeghi, Ahmad-Reza and Winandy, Marcel :
A Pattern for Secure Graphical User Interface Systems.
3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications IEEE
[Conference or Workshop Item] , (2009)

Abstract

Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of users with the user interface of applications. Especially graphical user interfaces tend to get complex and vulnerable to spoofing and eavesdropping, e.g., due to key loggers or fake dialog windows. A secure user interface system has to provide a trusted path between the user and the application the user intends to use. The trusted path must be able to ensure integrity and confidentiality of the transmitted data, and must allow for the verification of the authenticity of the end points. We present a pattern for secure graphical user interface systems and evaluate its use in different implementations. This pattern shows how to fulfill the security requirements of a trusted path while preserving, in a policy-driven way, the flexibility that graphical user interfaces generally demand.

Item Type: Conference or Workshop Item
Erschienen: 2009
Creators: Fischer, Thomas and Sadeghi, Ahmad-Reza and Winandy, Marcel
Title: A Pattern for Secure Graphical User Interface Systems
Language: German
Abstract:

Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of users with the user interface of applications. Especially graphical user interfaces tend to get complex and vulnerable to spoofing and eavesdropping, e.g., due to key loggers or fake dialog windows. A secure user interface system has to provide a trusted path between the user and the application the user intends to use. The trusted path must be able to ensure integrity and confidentiality of the transmitted data, and must allow for the verification of the authenticity of the end points. We present a pattern for secure graphical user interface systems and evaluate its use in different implementations. This pattern shows how to fulfill the security requirements of a trusted path while preserving, in a policy-driven way, the flexibility that graphical user interfaces generally demand.

Title of Book: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications
Publisher: IEEE
Uncontrolled Keywords: Secure Things;Graphical User Interface, Secure GUI, Security Pattern
Divisions: Department of Computer Science
Department of Computer Science > System Security Lab
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Date Deposited: 07 Aug 2016 23:04
Identification Number: TUD-CS-2009-1848
Related URLs:
Export:

Optionen (nur für Redakteure)

View Item View Item