Investigation of Instructions for Password Generation

Slides:



Advertisements
Similar presentations
A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
Advertisements

Author Instructions How to upload a full session proposal with abstracts – two step process.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
Multimodal feedback : an assessment of performance and mental workload (NASA-TLX) 남종용.
ACADEMIC COMPUTING ESSENTIALS For SCCC students. Login instructions for My SCCC Student Portal using Banner For access to: Class schedule, SAIN report,
Writing Program Assessment Report Fall 2002 through Spring 2004 Laurence Musgrove Writing Program Director Department of English and Foreign Languages.
How to Login into SSA ?. Home Page Click on My Profile.
Linking Studies EOG and NCEXTEND2 EOC and NCEXTEND2 Assessment Training April 3, 2013.
1. 2 Overview of AT&T EPIC Ordering Process for SUS (Supply Order) Suppliers 1.AT&T User creates shopping cart on internal web-based portal 2.Shopping.
Mobile Text Entry: Methods and Evaluation CSCI 4800 March 31, 2005.
SEVEN STRATEGIES FOR IMPROVING TEST PERFORMANCE
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Multiple Password Interference in text Passwords and click based Graphical Passwords by Sonia Chiasson, Alian Forget, Elizabeth Stobert, PC van Oorschot.
The Influence of Blended Learning Model on Developing Leadership Skills of School Administrators Dr. Tufan AYTAÇ Dr. Tufan AYTAÇ Education Specialist The.
Security Planning and Administrative Delegation Lesson 6.
Your business technologists. Powering progress September 2015 Reset password in the supplier portal.
T 7.0 Chapter 7: Questioning for Inquiry Chapter 7: Questioning for Inquiry Central concepts:  Questioning stimulates and guides inquiry  Teachers use.
FMCSA Portal Enforcement: Online Self Service Account Management Prioritization Phase I Release, December 2010 v1.0.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Measuring Complex Achievement
Learning From Assessment: Evaluating the Benefits of DALI (Diagnostic Assessment Learning Interface) Hershbinder Mann & Guinevere Glasfurd-Brown, University.
Author Instructions How to upload Single Abstract to the paper management system.
Sourcing Event Guide Updated September 12, 2011 Sourcing Event Guide.
Evaluation of Shoreline Science Jia Wang & Joan Herman UCLA Graduate School of Education & Information Studies National Center for Research on Evaluation,
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Security Planning and Administrative Delegation Lesson 6.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Policy 2 Dr.Talal Alkharobi. 2 Create Appropriate Policy Each organization may need different policies. Policy templates are useful to examine and to.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Class Discussions Using Facebook Presentation By: Katie Rosko.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
Usability Results Feedback from Parents Task 1: Create a wikispaces account, request membership Feedback: “Creating an account was pretty straightforward,
In-Service Teacher Training Assessment in IGCSE Biology 0610 Session 2: Question papers and mark schemes.
On-Line BankCard Center Presentation Cardholder Role During the Presentation click the mouse on this button to move back a slide During the Presentation.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
CPD 3 - Advanced Publishing Skills 1 - How to Get Published and to Continue to Get Published in Leading Academic Journals Professor Tarani Chandola with.
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
Effects of Word Concreteness and Spacing on EFL Vocabulary Acquisition 吴翼飞 (南京工业大学,外国语言文学学院,江苏 南京211816) Introduction Vocabulary acquisition is of great.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
PeerWise Student Instructions
Aim To test Cherry’s findings on attention ‘more rigorously’. Sample
Towards Human Computable Passwords
Welcome! To the ETS – Create Client Account & Maintenance
Final Report.
Introduction to Visual Basic 2008 Programming
Phil Denton and David McIlroy, Faculty of Science
Francesc Pedró Katerina Ananiadou Seoul, 9 – 11 November 2009
Sona Systems Training for Students
Human Computable Passwords
Parent Information & Training Session #1
2 independent Groups Graziano & Raulin (1997).
Discrete Structures for Computer Science
Setting up an online account
Writing the Results Section
Pregnancy and Maternity Discrimination: Overview
Systems Analysis and Design
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Sha Yang, Brian T. Berndt, Dr. William Watson
SEVEN STRATEGIES FOR IMPROVING TEST PERFORMANCE
North Carolina Positive Behavior Support Initiative
One-Way Analysis of Variance
Writing the Introduction
Chapter 5 Advanced Data Modeling
The Systematic Vocabulary Instruction Project
Julie Booth, Robert Siegler, Ken Koedinger & Bethany Rittle-Johnson
SDLC Phases Systems Design.
Developing Quality Assessments
Anna Adams Martina Angela Sasse
Presentation transcript:

Investigation of Instructions for Password Generation Robert W. Proctor Department of Psychological Sciences Ninghui Li Department of Computer Science Based on: Yang, W., Li, N., Chowdhury, O., Xiong, A., & Proctor, R. W. (2016). An empirical study of password generation strategies. Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016).

Passwords Primary means of authentication “The number of accounts we use is growing at a 14% rate… In 2020, the average number of accounts per Internet user will be 207! Are you ready to remember 207 login and password combos?” (Le Bros, 2015, Dashlane blog) Continue to be used because Accepted by users Relatively easy to implement There are figures on the right if you want to use them as an example for the permission list

Password Composition Many users do not create secure passwords (Nicholas, 2016) There are figures on the right if you want to use them as an example for the permission list

How do you get users to generate secure and memorable passwords? Password Composition Rules use of both upper-case and lower-case letters inclusion of one or more numerical digits inclusion of special characters, such as @, #, $ Computer-Generated Passwords Difficult for users to remember There are figures on the right if you want to use them as an example for the permission list

How do you get users to generate secure and memorable passwords? Mnemonic strategies 1. Think of a memorable sentence or phrase containing at least seven or eight words. For example, “Four score and seven years ago our fathers brought forth on this continent”. 2. Select a letter, number, or a special character to represent each word. A common method is to use the first letter of every word. For example: four⇒4, score⇒s, and⇒&. Combine them into a password: 4s&7yaofb4otc. There are figures on the right if you want to use them as an example for the permission list

Effect of Instructions Instructions are provided when people create passwords However, research has not systematically investigated how instructions affect: the security of the generated passwords the usability of the method memorability of the passwords  There are figures on the right if you want to use them as an example for the permission list

Study 1: Security of Mnemonic-based Strategy Variants

Study 1: Security of Mnemonic-based Strategy Variants

Study 1: Security of Mnemonic-based Strategy Variants MTurk Workers Participants were asked to type the sentence used in the intermediate step, after which they were to enter the password. Participants warned not to use their actual passwords. We forbade passwords that were the same as the examples and that did not appear to be generated following the instructions.

Table: Collisions Among the Top and Top 10 Passwords There are figures on the right if you want to use them as an example for the permission list

Study 1 Findings Finding 1: Using generic instructions and examples results in weak passwords. Finding 2: Instructions requesting personal-ized sentences and containing appropriate examples lead to strong passwords. 536 sentences in MnePerEx started with “I” or “my”, suggesting a personalized choice. In comparison, such sentences appeared only 125 times in MneGenEx. There are figures on the right if you want to use them as an example for the permission list

Study 1 Findings Finding 3: Commonly suggested instantiations are worse than MnePerEx. Finding 4: Both personalized sentences and high-quality examples are needed to achieve better security. MneEx and MnePer For both MneEx and MnePer, number of collisions was greater than for MnePerEx, although less than for MneGenEx. There are figures on the right if you want to use them as an example for the permission list

Study 2: Usability & Memorability of Mnemonic Strategies Examined the usability and memorability of MneGenEx, MnPerEx, and a Control condition. Told that they would be asked to return and use the password in about one week, and they could take whatever measures they would normally take to remember and protect the passwords. Each participant was asked to create an online account for a bank named “Provident Citizens Bank”. Half of participants tested for recall at end of session; all invited to return 1 week later. Filled out NASA TLX for initial password generation and final recall.

Study 2: First Phase Results Compared with MneGenEx, password generation time was shorter in MnePerEx. The workload required in the Control condition was lower than that in the two mnemonic strategy variants, which did not differ. Short-term recall: Almost all participants entered the correct password.

Study 2: Second Phase Results The final successful recall rate did not differ significantly among the conditions. Those who did short-term recall tended to have higher success rates for long-term recall in all conditions. The password recall time in the Control condition was shorter than that for MneGenEx and MnePerEx conditions, for which there was no significant difference.

Study 2: Second Phase Results NASA TLX subscales: Mental workload and frustration ratings of mnemonic strategy variants were higher than those of the Control. At the end of the task, participants were asked to update the password, without any restriction except that the it could not be the same as the old one. About 70% of participants in MneGenEx and MnePerEx said “yes” to a question about whether they used the strategy we provided.

Summary The specific instructions used for mnemonic strategies are important in determining the passwords that are created. Instructions emphasizing personal information and including multiple examples provide the strongest security with no additional cost in usability and memorability. There are figures on the right if you want to use them as an example for the permission list

Broader Conclusions Instructions and feedback that highlight declarative and procedural knowledge about security action in which users must engage is essential. Instructions and warnings should be designed to have training embedded in them.