Publications
Below is a searchable list of publications by the projects of the Priority Program.
1.
Froehlich, Michael; Hulm, Philipp; Alt, Florian
Under Pressure. A User-Centered Threat Model for Cryptocurrency Owners Proceedings Article
In: Proceedings of the 2021 4th International Conference on Blockchain Technology and Applications, pp. 39–50, Association for Computing Machinery, Xi’an, China, 2022, ISBN: 9781450387460.
Abstract | Links | BibTeX | Tags: blockchain, cryptocurrency, hci, threat model, user-centered
@inproceedings{10.1145/3510487.3510494,
title = {Under Pressure. A User-Centered Threat Model for Cryptocurrency Owners},
author = {Michael Froehlich and Philipp Hulm and Florian Alt},
url = {https://doi.org/10.1145/3510487.3510494},
doi = {10.1145/3510487.3510494},
isbn = {9781450387460},
year = {2022},
date = {2022-01-01},
booktitle = {Proceedings of the 2021 4th International Conference on Blockchain Technology and Applications},
pages = {39–50},
publisher = {Association for Computing Machinery},
address = {Xi'an, China},
series = {ICBTA '21},
abstract = {Cryptocurrencies have gained popularity in recent years. However, for many users, keeping ownership of their cryptocurrency is a complex task. News reports frequently bear witness to scams, hacked exchanges, and fortunes beyond retrieval. However, we lack a systematic understanding of user-centered cryptocurrency threats, as causes leading to loss are scattered across publications. To address this gap, we conducted a focus group (n=6) and an expert elicitation study (n=25) following a three-round Delphi process with a heterogeneous group of blockchain and security experts from academia and industry. We contribute the first systematic overview of threats cryptocurrency users are exposed to and propose six overarching categories. Our work is complemented by a discussion on how the human-computer-interaction community can address these threats and how practitioners can use the model to understand situations in which users might find themselves under the pressure of an attack to ultimately engineer more secure systems.},
keywords = {blockchain, cryptocurrency, hci, threat model, user-centered},
pubstate = {published},
tppubtype = {inproceedings}
}
Cryptocurrencies have gained popularity in recent years. However, for many users, keeping ownership of their cryptocurrency is a complex task. News reports frequently bear witness to scams, hacked exchanges, and fortunes beyond retrieval. However, we lack a systematic understanding of user-centered cryptocurrency threats, as causes leading to loss are scattered across publications. To address this gap, we conducted a focus group (n=6) and an expert elicitation study (n=25) following a three-round Delphi process with a heterogeneous group of blockchain and security experts from academia and industry. We contribute the first systematic overview of threats cryptocurrency users are exposed to and propose six overarching categories. Our work is complemented by a discussion on how the human-computer-interaction community can address these threats and how practitioners can use the model to understand situations in which users might find themselves under the pressure of an attack to ultimately engineer more secure systems.