Volume 13 - Issue 1
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations
- Salvatore Manfredi
Security and Trust, FBK, Trento, Italy, DIBRIS, University of Genoa, Genoa, Italy
smanfredi@fbk.eu
- Mariano Ceccato
University of Verona, Verona, Italy
mariano.ceccato@univr.it
- Giada Sciarretta
Security and Trust, FBK, Trento, Italy
giada.sciarretta@fbk.eu
- Silvio Ranise
Security and Trust, FBK, Trento, Italy, Department of Mathematics, University of Trento, Trento, Italy
ranise@fbk.eu
Keywords: vulnerability detection, usability study, actionable mitigations, security reports, TLS misconfiguration
Abstract
Several automated tools have been proposed to detect vulnerabilities. These tools are mainly evaluated
in terms of their accuracy in detecting vulnerabilities, but the evaluation of their usability is
commonly neglected. Usability of automated security tools is particularly crucial when dealing with
problems of cryptographic protocols for which even small—apparently insignificant—changes in
configuration can result in vulnerabilities that, if exploited, pave the way to attacks with dramatic
consequences for the confidentiality and integrity of the exchanged messages. This becomes even
more acute when considering such ubiquitous protocols as the one for Transport Layer Security
(TLS for short). In this paper, we present the design and the lessons learned of a user study, meant
to compare two different approaches when reporting misconfigurations. Results reveal that including
contextualized actionable mitigations in security reports significantly impact the accuracy and the
time needed to patch TLS vulnerabilities. We used these results to build an open-source tool called
TLSAssistant, able to combine state-of-the-art analyzers with a report systems that generates actionable
mitigations to assist the user. Finally, we report our experience in using TLSAssistant in two
case studies conducted in a corporate environment.