Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.

Slides:



Advertisements
Similar presentations
AUTHENTICATION AND KEY DISTRIBUTION
Advertisements

Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
Digital Signatures and Hash Functions. Digital Signatures.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
VM: Chapter 5 Guiding Principles for Software Security.
3d ..
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Tirgul 8 Universal Hashing Remarks on Programming Exercise 1 Solution to question 2 in theoretical homework 2.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Course: Introduction to Computers
Pseudorandom Number Generators. Randomness and Security Many cryptographic protocols require the parties to generate random numbers. All the hashing algorithms.
Authentication Deniable Authentication Protection Against Dictionary Attacks Isidora Petreska Dimitar Gosevski and.
How do people communicate with computers?
Ch 26 & 27 User Interfaces.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Ihr Logo Data Explorer - A data profiling tool. Your Logo Agenda  Introduction  Existing System  Limitations of Existing System  Proposed Solution.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 13 Database Management Systems: Getting Data Together.
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Oct 30, 2006 LUONNOS Navigation techniques for construction industry product models Jukka Rönkkö, HUT/VTT
1 Direct Manipulation Proposal 17 Direct Manipulation is when physical actions are used instead of commands. E.g. In a word document when the user inputs.
Abstract Many security primitives are based on hard math¬ematical problems. Using hard AI problems for security is emerging as an exciting new paradigm,
CS CS 5150 Software Engineering Lecture 18 Security.
Evaluation of software engineering. Software engineering research : Research in SE aims to achieve two main goals: 1) To increase the knowledge about.
Components of Database Management System
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Reusability and Effective Test Automation in Telecommunication System Testing Mikael Mattas Supervisor: Professor Sven-Gustav Häggman Instructor: B.Sc.
Hiding Data in “Plain Sight” Computer Forensics BACS 371.
EZee iCafe System. Contents Introduction Current Scenario Proposed Solution Architecture / Block Diagram Hardware / Software Requirements Features Benefits.
Visual Authentication Mechanisms. Rationale “Human memory for images is better than for words” Human memory for faces in particular is extremely good.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 “Genetic Algorithms are good at taking large, potentially huge search spaces and navigating them, looking for optimal combinations of things, solutions.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Basic Computer for Small Business
Systems Analysis and Design in a Changing World, Fourth Edition
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
Color Theory in Web Design Web Design – Sec 2-2. Objectives  The student will: –Have a better understanding of effective use of color on the web. –Be.
Input Design Lecture 11 1 BTEC HNC Systems Support Castle College 2007/8.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
CS 127 Introduction to Computer Science. What is a computer?  “A machine that stores and manipulates information under the control of a changeable program”
Graphical VS Textual Presented by Ding Li Nicholas Wright, Andrew S. Patrick, and Robert Biddle. “Do you see your password? Applying recognition to textual.
Software Development Life Cycle (SDLC)
Introduction TO Network Administration
HumanAut (or SecHCI: Secure Human- Computer Identification System against Peeping Attacks) Shujun LI Xi’an Jiaotong Univ. Oct
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
COOKIES AND SESSIONS.
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
Object Oriented Modelling for Rotor Dynamics Analysis RomaxDynamic s.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
3D Password.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Authentication Schemes for Session Passwords using Color and Images
Designing Information Systems Notes
Understand Windows Forms Applications and Console-based Applications
Tradeoff Analysis of Strategies for System Qualities
Human Computable Passwords
Presentation transcript:

Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing Xi’an Jiaotong University April, 2002

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia Table of Contents 1.What is Trustworthy Computing? 2.Does Perfect Trustworthiness Exist? 3.How to Increase Trustworthiness? 4.A Case Study: Visual Password  What/Why/How about Visual Password  Some Proposed Schemes  A Comparison Between Visual Password and Textual Password from Trustworthy Viewpoint  Problems, Principles and Solutions

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 1. What is Trustworthy Computing? “ Trustworthy computing is a label for a whole range of advances that have to be made for people to be as comfortable using devices powered by computers and softwares as they are today using a device that is powered by electricity. ” —— Microsoft White Paper: Trustworthy Computing “ Trustworthy computing is a multi-dimensional set of issues ” : good availability for almost needs requested by the users, acceptable reliability of provided services, high security of users ’ data and system configurations, recoverability of damaged systems and lost data, full control of users ’ data only by themselves with suitable manners, great reputation of the services providers, etc.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 2. Does Perfect Trustworthiness Exist? Nothing is perfect. We can only provide ENOUGH trustworthiness in practice. It is very hard to give a “ right ” definition of trustworthiness. Trustworthiness is a complicated concept in both technical and social world. “ An architecture built on diversity is robust, but it also operates on the edge of chaos. ” As a natural result, it is very difficult to exactly analyze the trustworthiness of Trade-offs exist between the different requirements of “ perfect trustworthiness ”. For example, higher security always corresponds to less usability, higher trustworthiness needs more costs in many cases.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 3. How to Increase Trustworthiness? Avoid using insecure codes Trustworthiness first, not new features Adopt suitable algorithms to protect the security and integrity of users ’ data and systems Keep in mind that “ a computing system is only as trustworthy as its weakest link ” Users-centered design, coding and support Keep things simple to enhance usability and long- term and large-scale reliability More redundancy trend to less risks

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 4a. A Case Study: Visual Password ? What is Visual Password? The user interface by which one can generate password with graphical/visual operations, such as movement and clicking of mouse on a picture. ? Why Use Visual Password? It may provide higher trustworthiness than traditional textual password. ? How to Make Visual Password? Some schemes have been proposed, we will briefly introduce and analyze those ideas. Some principles and more potential solutions will also be discussed.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 4b. Some Proposed Schemes 1.Drawing-Based Visual Password: I. Jermyn ’ s Graphical Password for PDA 2.Visual Password Based on Selected Secret Pictures from a Picture Database: PassFace TM and D é j à Vu System 3.Click-by-Click Visual Password: Blonder ’ s Patent, PassPic TM, Passlogix v-GO TM Graphical Password Window, Darko Kirovski ’ s System (Microsoft) More details about proposed schemes are needed for further investigations.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 4c. A Comparison Between Visual Password and Textual Password Textual Password Visual Password Usability Inconvenient for young children and the blind Inconvenient for the blind Memorizablity & Security to Dictionary Attack Easily-memorizable passwords are weak to dictionary attack, while “ good ” ones are generally hard to be memorized. Many strong passwords may be easily memorized. Dictionary attack becomes more hard. Security to Shoulder- Surfing Attack The slower the typewriting speed, the weaker the security. All proposed schemes cannot resist shoulder- surfing attack.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 4d. Problems: How to Resist Shoulder-Surfing Attack? ? How does shoulder-surfing attack work? Once one impostor peeps legal users ’ login actions, he can repeat those actions to cheat the login system, without guessing the right password behind such login actions. ? How to resist shoulder-surfing attack? The login operations of different logins must not be same. We call such a feature time-variant login-actions. ? How to obtain time-variant property? Pseudo-randomization mechanism may be helpful.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 4d. Principles: Visual Password 1.Larger strong key space than textual password 2.Similar or better usability than textual password: a) easy user interface; b) good memorizability. 3.Resistance to shoulder-surfing attack: Is such a capability possible? (Clue: a shoulder-surfing attacker can see what you can see and understand what you can understand; people hate hard deduction required by time-variant login- actions.) 4.Acceptable solution of the trade-off between usability and security.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 4d. Solutions: A Theoretical Model of Visual Password Login System Resisting Shoulder-Surfing Attack Here, PCNL should satisfy the following requirements: deducing the actions in the next login is easy enough for legal users who know the password, but is hard enough for illegal users who have monitored your previous logins.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 4d. Problems: Is a Practical PCNL Possible? 1.In fact, a PCNL is a trapdoor function from cryptographic viewpoint. 2.Human beings are not machines and hate complicated deduction, a PCNL MUST be easy enough for any users, including young children. 3.Legal users may forget what they input in the last login, clues should be given to remind them. Consider such clues may be also peeped by an impostor, they should not provide useful information to him under the assumption that he does not know password. Now I have not found a really practical PCNL. Does a practical PCNL exist? We try to find the answer.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia 4d. Solutions: More Fresh Ways? 1.More Click-by-Click Visual Passwords: Visual Password Based on Clicking Picture Properties, such as differences of a pair of pictures, the relations between two countries in a world map, the geometry properties of elements in a computer painting. 2.Visual Passwords Based on Specially-Designed Input Devices: a) Device tracking users’ eyes; b) “Strange” mouse that can generate password by ones touching different parts; c) “Strange” glasses that can generate different scenes from different view directions with enough sensitivity.

April, 2002Shujun Li, VS at VC Group of Microsoft Research Asia Thanks For your watching and advice!