Usable Authentication Research with the MVP Framework Robert Biddle Carleton University, Ottawa Sonia Chiasson, Chris Deschamps,

Slides:



Advertisements
Similar presentations
Creating a Login Process Creating a users table and a login form that denies access to unauthorized users.
Advertisements

A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
ByPass A platform to evaluate Android authentication techniques Payas Gupta & Sarah Smith.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
BUILD & PUBLISH A WEBSITE Introduction. WORDPRESS It is a Blogging software, like an online diary Take away the Blogging part and it as a simple CMS (Content.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Use Your Illusion: Secure Authentication Usable Anywhere Eiji Hayashi Nicolas Christin Rachna Dhamija Adrian Perrig Carnegie Mellon CyLab Japan.
Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.
3d ..
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
User Testing & Experiments. Objectives Explain the process of running a user testing or experiment session. Describe evaluation scripts and pilot tests.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Authentication and access control.
1 User Centered Design and Evaluation. 2 Overview Why involve users at all? What is a user-centered approach? Evaluation strategies Examples from “Snap-Together.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
1 / 31 CS 425/625 Software Engineering User Interface Design Based on Chapter 15 of the textbook [SE-6] Ian Sommerville, Software Engineering, 6 th Ed.,
Graphical Passwords with Integrated Trustworthy Interface TIPPI Workshop June 19, 2006 Patricia Lareau V P Product Management.
1 User Centered Design and Evaluation. 2 Overview My evaluation experience Why involve users at all? What is a user-centered approach? Evaluation strategies.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Knowledge is Power Marketing Information System (MIS) determines what information managers need and then gathers, sorts, analyzes, stores, and distributes.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
Keylogger A presentation of computer safety. What is a Keylogger?  A keylogger is an invisible tool for surveillance that allows you to monitor the activities.
E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson,
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
On the Security of Picture Gesture Authentication Ziming Zhao †‡, Gail-Joon Ahn †‡, Jeong-Jin Seo †, Hongxin Hu § † Arizona State University ‡ GFS Technology.
1 Authentication and access control overview. 2 Outline Definitions Authentication Factors Evaluation Examples  Focus on password problems and alternatives.
Multiple Password Interference in text Passwords and click based Graphical Passwords by Sonia Chiasson, Alian Forget, Elizabeth Stobert, PC van Oorschot.
CS 4720 Usability and Accessibility CS 4720 – Web & Mobile Systems.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Security & Usability Charles Frank. Convenience is the Antithesis to Security  Computer systems must employ mechanisms that are difficult to use!
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
Usability Evaluation June 8, Why do we need to do usability evaluation?
Click to edit Master subtitle style USABILITY and USER INTERFACE DESIGN Application.
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
Technical Paper Review Designing Usable Web Forms – Empirical Evaluation of Web Form Improvement Guidelines By Amit Kumar.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Mental Models Sonia Chiasson and Robert Biddle Human Oriented Technology Lab Carleton University, Ottawa.
ITGS Databases.
Usability Engineering Dr. Dania Bilal IS 582 Spring 2006.
Blogging With WordPress Department of Information Science & Engineering Gogte Institute of Technology, Belgaum.
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
G53SEC 1 Authentication and Identification Who? What? Where?
Website that support online communities 1. Wikis 2. Blogs 3. Forums 4. Social networking sites.
Usability Engineering Dr. Dania Bilal IS 592 Spring 2005.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
Graphical VS Textual Presented by Ding Li Nicholas Wright, Andrew S. Patrick, and Robert Biddle. “Do you see your password? Applying recognition to textual.
Executive Summary - Human Factors Heuristic Evaluation 04/18/2014.
Human-Computable Passwords Jeremiah Blocki Manuel Blum Anupam Datta Santosh Vempala.
Working with ASP.NET Controls What is ASP.NET Using server controls in your pages Allowing users to create their own accounts Creating a login page Letting.
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
Computer Security Set of slides 8 Dr Alexei Vernitski.
1 Saltzer [1974] and later Saltzer and Schroeder [1975] list the following principles of the design of secure protection systems, which are still valid:
Usability of CAPTCHAs Or usability issues in CAPTCHA design Authors: Jeff Yan and Ahmad Salah El Ahmad Presented By: Kim Giglia CSC /19/2008.
Design Evaluation Overview Introduction Model for Interface Design Evaluation Types of Evaluation –Conceptual Design –Usability –Learning Outcome.
Engineering Secure Software. Taher El-Gamal, inventor of SSL Security professionals always struggle with the general public because usability always wins.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. REDCap:
USABILITY Ben Aaron.
Authentication Schemes for Session Passwords using Color and Images
Chapter One: Mastering the Basics of Security
Password Management Limit login attempts Encrypt your passwords
Security Indicators and Warnings
Scientific Method Steps
Anna Adams Martina Angela Sasse
Presentation transcript:

Usable Authentication Research with the MVP Framework Robert Biddle Carleton University, Ottawa Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Nick Wright, Bruna Machado Freitas, Alain Forget, Andrew Patrick Biddle: MVP1

Agenda Usable Security and Authentication MVP Framework MVP Authentication Schemes MVP Management MVP Recent Research Results Dalhousie Action Items References: – Graphical Passwords: Learning from first 12 years – The MVP Framework Web-Based Framework – Biddle: MVP2

Usable Security Saltzer and Schroeder, 1975: “It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly. Also, to the extent that the user’s mental image of his protection goals matches the mechanisms he must use, mistakes will be minimized. If he must translate his image of his protection needs into a radically different specification language, he will make errors.” Cranor and Garfinkel, 2005: “secure systems that people can use.” Biddle3

Usable Security Challenges Security is a Secondary Task – Avoided or evaded if inconvenient Security has the “Barn Door” Property – Brief exposure can cause permanent damage Security has a complex language – Encryption, public/private keys, phishing, … Security is poorly understood by users – Users do not understand consequences of insecure actions, assume they are not at risk, underestimate attackers’ abilities Biddle4

Research Methods Human Factors Principles Usability Evaluation Methods Experiment and Field Study Design Ethical Procedures for Human Participants Quantitative Analysis and Statistical Inference Qualitative Study and Data Analysis Reporting Results, Graphical Data Presentation Biddle5

Authentication and Credentials Something You Have Can be Lost or Stolen Something You Are Hard to Change; Privacy Loss Something You Know Hard to Recall; Guessed or Captured rosebud 6Biddle

Threats to Passwords Guessing – Online (Web-Robots) or Offline (Access to DB) – Single-User (Targeted) of Multi-User (Any User) – Exhaustive or Dictionary Capture – Shoulder-Surfing (by eye or by video) – Social Engineering (incl. phishing) – Malware (keyloggers etc.) Biddle7

The Password Problem Passwords should be: – Easy to Remember, but – Difficult to Guess For multiple passwords! Sometimes with rules! Different rules for each password! And compulsory regular changes! Biddle: MVP8

Theoretical Password Space The number of possible passwords that a scheme allows. Therefore, the number of passwords an attacker must guess to ensure success. Therefore, an expected value function for each attacker guess. IF all passwords are equally likely. Biddle: MVP9

Theoretical Password Space: E.g. PassPoints Password Space Biddle: MVP10

Effective Password Space The number of passwords people are likely to actually choose. But it’s not one space: it’s a curve. So… Matt Weir: reusablesec.blogspot.com Biddle: MVP11

MVP: Multiple Versatile Passwords Framework for Empirical Research on Usable Knowledge-Based Authentication Basic idea: allow new kinds of password schemes within an ecologically valid setting Real sites, real usage Passwords used in context, secondary task Biddle: MVP12

Site password input redirects to MVP MVP selects scheme based on userid Scheme runs, logging all events Result is rendered as text password to site Biddle: MVP13

MVP in Use Button instead of “Enter Password” field Pop-up Window with selected Scheme Biddle: MVP14

MVP Schemes: Text Pure user-chosen text User-chosen text with rules – Length, required chars, denied chars, etc. Assigned random text – Length, alphabet Multiple word text – Number of words, chosen or assigned, lists Biddle: MVP15

MVP Schemes: Recognition Like PassFaces – Number of panels – Images per panel – Image sets Faces Houses Objects Biddle: MVP16

MVP Schemes: Graphical Recall Like Draw-a-Secret – Grid size Biddle: MVP17

MVP Schemes: Click-Based Passpoints – 5 Points on Image – Tolerance areas – Can vary: Number of Clicks Image Sets Biddle: MVP18

MVP Schemes: Click Based Cued-Click Points – Like Passpoints, but 1-click per image – Each click selects next image – Number of images parameter Biddle: MVP19

MVP Schemes: Click Based Persuasive Cued Click Points – Like CCP, but with random viewport Biddle: MVP20

MVP Schemes: Other 2 nd gen DAS, PP, CCP, PCCP, Recognition Text Recognition PassTiles Family GridSure CYOA More??? Biddle: MVP21

MVP Website Engine Plugins Wordpress – Blog Engine with many other plugins, e.g. voting, eCommerce, photo-sharing etc. phpBB – Generalizable Bulletin Board osCommerce – eCommerce web-store system Drupal – Content Management System Biddle: MVP22

MVP Wordpress Admin MVP Plugin, Registration Plugin, Timeout Biddle: MVP23

MVP System Management Control Panel – f(username, system): Scheme Log – Time, System, User, Mode, Event, Data Booking and Questionnaires Registration and Notification Validation and Verification Etc. Biddle: MVP24

MVP Username Management By name pattern – E.g. dal (Between Subjects Group 1) Campusblog: scheme=textrules, cond=alphaonly Photos: scheme=textrules, cond=alphaonly DailyNews: scheme=textrules, cond=alphaonly – E.g. dal (Between Subjects Group 2) Campusblog: scheme=recognition, cond=faces Photos: scheme=recognition, cond=faces DailyNews: scheme=recognition, cond=faces – E.g. dal (Within Subjects) Campusblog: scheme=recognition, cond=faces Photos: scheme=textrules, cond=alphaonly DailyNews: scheme=textassigned, cond=az09-6 Cornerstore: scheme=textrules, cond=alphaonly By name assignment Biddle: MVP25

MVP Log Time: Timestamp to 1 second System: Name of website User: Username Scheme: Scheme Condition: subscheme Mode: create, enter, login Event: specific to mode Data: specific to event Biddle: MVP26

MVP Sites, Schemes, Studies

Comparing Password Schemes Criteria: – Memorability – Entry Time – Learnability – Perception of Value – Affective Appeal Measurements: – How to measure each? – How to compare each? Biddle: MVP28

Max Hlywa: In Recognition-Based GPs, are Faces the most Memorable Images? Hylwa co-supervised by Andrew Patrick.

No

Also, they’re slow.

Bruna Machado Freitas: How do people really use Draw-A-Secret?

Not well. Favour Similar Squares Favour Simple Shapes Favour Password Reuse Misunderstand Encoding 1 unique password61% 2 unique passwords18% 3 unique passwords21%

Nick Wright: Are Text Recognition Passwords More Memorable than Text Recall? Wright co-supervised by Andrew Patrick.

Elizabeth Stobert: Are assigned graphical passwords memorable?

Dal Action Items Populate sites: – dal2, dal3, dal4 – Choose name, theme, content Choose two schemes: – With exact specifics, numbers, images etc Choose research plan: – Consider password space – Consider research question: E.g. Effect of schemes, sizes, images, etc. – Consider criteria: Memorability, entry time, appeal, etc. – Consider metrics: How to evaluate criteria Biddle: MVP36

Usable Authentication Research with the MVP Framework Robert Biddle Carleton University, Ottawa Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Nick Wright, Bruna Machado Freitas, Alain Forget, Andrew Patrick Biddle: MVP37