Home > Research > Publications & Outputs > Designing Through The Stack

Links

Text available via DOI:

View graph of relations

Designing Through The Stack: The Case for a Participatory Digital Security By Design

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Designing Through The Stack: The Case for a Participatory Digital Security By Design. / Slesinger, Ian; Coles-Kemp, Lizzie; Panteli, Niki et al.
Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022. Association for Computing Machinery (ACM), 2022. p. 45-59 (ACM International Conference Proceeding Series).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Slesinger, I, Coles-Kemp, L, Panteli, N & Hansen, RR 2022, Designing Through The Stack: The Case for a Participatory Digital Security By Design. in Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022. ACM International Conference Proceeding Series, Association for Computing Machinery (ACM), pp. 45-59, 2022 New Security Paradigms Workshop, NSPW 2022, North Conway, United States, 24/10/22. https://doi.org/10.1145/3584318.3584322

APA

Slesinger, I., Coles-Kemp, L., Panteli, N., & Hansen, R. R. (2022). Designing Through The Stack: The Case for a Participatory Digital Security By Design. In Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022 (pp. 45-59). (ACM International Conference Proceeding Series). Association for Computing Machinery (ACM). https://doi.org/10.1145/3584318.3584322

Vancouver

Slesinger I, Coles-Kemp L, Panteli N, Hansen RR. Designing Through The Stack: The Case for a Participatory Digital Security By Design. In Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022. Association for Computing Machinery (ACM). 2022. p. 45-59. (ACM International Conference Proceeding Series). doi: 10.1145/3584318.3584322

Author

Slesinger, Ian ; Coles-Kemp, Lizzie ; Panteli, Niki et al. / Designing Through The Stack : The Case for a Participatory Digital Security By Design. Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022. Association for Computing Machinery (ACM), 2022. pp. 45-59 (ACM International Conference Proceeding Series).

Bibtex

@inproceedings{9ae41524217f4a3896788261346d3ad5,
title = "Designing Through The Stack: The Case for a Participatory Digital Security By Design",
abstract = "Whilst participatory practice is increasingly adopted in end user studies, there has been far less use of a participatory approach when designing lower down the software stack. As a result, end users are often presented with security controls over which they have no control but for which they retain the responsibility. Conversely, hardware and software engineers struggle to innovate new security control designs that are resilient to new and emerging threats. In a study utilising ethnographic research and stakeholder interviews, we show that there is a siloing of communities of practice between hardware security engineers, software engineers and coders, manufacturers in the technology supply chain and end users. Our findings indicate that this siloing and a lack of participatory practice impedes the development of a more cohesive digital security design that integrates security through the stack from the hardware layer upwards to the OS and application layers. These barriers make difficult the negotiation between what is possible lower down the stack with what is needed and wanted higher up the stack. Our findings suggest that a more holistic and comprehensive participatory design approach is required to negotiate a digital security by design paradigm that more evenly distributes power over and responsibility for security controls throughout the stack. Working with the HCI literature on co-production in design, this paper will suggest that a pathway for breaking through this impasse is to utilise objects in the design process of the hardware secure instruction set architecture as a feedback mechanism to incorporate other sets of designers and users in the design process to create a more workable stack.",
keywords = "digital security by design, hardware security engineering, participatory design, software security engineering",
author = "Ian Slesinger and Lizzie Coles-Kemp and Niki Panteli and Hansen, {Rene Rydhof}",
year = "2022",
month = oct,
day = "24",
doi = "10.1145/3584318.3584322",
language = "English",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery (ACM)",
pages = "45--59",
booktitle = "Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022",
address = "United States",
note = "2022 New Security Paradigms Workshop, NSPW 2022 ; Conference date: 24-10-2022 Through 27-10-2022",

}

RIS

TY - GEN

T1 - Designing Through The Stack

T2 - 2022 New Security Paradigms Workshop, NSPW 2022

AU - Slesinger, Ian

AU - Coles-Kemp, Lizzie

AU - Panteli, Niki

AU - Hansen, Rene Rydhof

PY - 2022/10/24

Y1 - 2022/10/24

N2 - Whilst participatory practice is increasingly adopted in end user studies, there has been far less use of a participatory approach when designing lower down the software stack. As a result, end users are often presented with security controls over which they have no control but for which they retain the responsibility. Conversely, hardware and software engineers struggle to innovate new security control designs that are resilient to new and emerging threats. In a study utilising ethnographic research and stakeholder interviews, we show that there is a siloing of communities of practice between hardware security engineers, software engineers and coders, manufacturers in the technology supply chain and end users. Our findings indicate that this siloing and a lack of participatory practice impedes the development of a more cohesive digital security design that integrates security through the stack from the hardware layer upwards to the OS and application layers. These barriers make difficult the negotiation between what is possible lower down the stack with what is needed and wanted higher up the stack. Our findings suggest that a more holistic and comprehensive participatory design approach is required to negotiate a digital security by design paradigm that more evenly distributes power over and responsibility for security controls throughout the stack. Working with the HCI literature on co-production in design, this paper will suggest that a pathway for breaking through this impasse is to utilise objects in the design process of the hardware secure instruction set architecture as a feedback mechanism to incorporate other sets of designers and users in the design process to create a more workable stack.

AB - Whilst participatory practice is increasingly adopted in end user studies, there has been far less use of a participatory approach when designing lower down the software stack. As a result, end users are often presented with security controls over which they have no control but for which they retain the responsibility. Conversely, hardware and software engineers struggle to innovate new security control designs that are resilient to new and emerging threats. In a study utilising ethnographic research and stakeholder interviews, we show that there is a siloing of communities of practice between hardware security engineers, software engineers and coders, manufacturers in the technology supply chain and end users. Our findings indicate that this siloing and a lack of participatory practice impedes the development of a more cohesive digital security design that integrates security through the stack from the hardware layer upwards to the OS and application layers. These barriers make difficult the negotiation between what is possible lower down the stack with what is needed and wanted higher up the stack. Our findings suggest that a more holistic and comprehensive participatory design approach is required to negotiate a digital security by design paradigm that more evenly distributes power over and responsibility for security controls throughout the stack. Working with the HCI literature on co-production in design, this paper will suggest that a pathway for breaking through this impasse is to utilise objects in the design process of the hardware secure instruction set architecture as a feedback mechanism to incorporate other sets of designers and users in the design process to create a more workable stack.

KW - digital security by design

KW - hardware security engineering

KW - participatory design

KW - software security engineering

U2 - 10.1145/3584318.3584322

DO - 10.1145/3584318.3584322

M3 - Conference contribution/Paper

AN - SCOPUS:85165775900

T3 - ACM International Conference Proceeding Series

SP - 45

EP - 59

BT - Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022

PB - Association for Computing Machinery (ACM)

Y2 - 24 October 2022 through 27 October 2022

ER -