E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson,

Slides:



Advertisements
Similar presentations
Creating Data Entry Screens in Epi Info
Advertisements

The quest to replace passwords Evangelos Markatos Based on a paper by Joseph Bonneau,Cormac Herley, Paul C. van Oorschot, and Frank Stajanod.
Lecture 6 User Authentication (cont)
Where Do All the Attacks Go? Dinei Florencio and Cormac Herley Microsoft Research, Redmond.
ByPass A platform to evaluate Android authentication techniques Payas Gupta & Sarah Smith.
Non-Text Passwords CRyptography Applications Bistro Jessica Greer February 12, 2004.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
3d ..
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Usable Authentication Research with the MVP Framework Robert Biddle Carleton University, Ottawa Sonia Chiasson, Chris Deschamps,
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Graphical Dictionaries Presentation by Roger Kahn1 Graphical Dictionaries & Memorable Space of Graphical Passwords.
Improving Usability Through Password-Corrective Hashing Andrew Mehler Steven Skiena Stony Brook University.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
A SECURE RECOGNITION BASED ON GRAPHICAL PASSWORD
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Multiple Password Interference in text Passwords and click based Graphical Passwords by Sonia Chiasson, Alian Forget, Elizabeth Stobert, PC van Oorschot.
CIS 450 – Network Security Chapter 8 – Password Security.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
G53SEC 1 Authentication and Identification Who? What? Where?
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Graphical Passwords Possible Collaborative Project Usable Security – CS 6204 – Fall,
How to use the Shield-2 Authentication Model (AC).
REVISITING DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS Mansour Alsaleh,Mohammad Mannan and P.C van Oorschot.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
G53SEC 1 Authentication and Identification Who? What? Where?
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
November 19, 2008 CSC 682 Do Strong Web Passwords Accomplish Anything? Florencio, Herley and Coskun Presented by: Ryan Lehan.
Graphical VS Textual Presented by Ding Li Nicholas Wright, Andrew S. Patrick, and Robert Biddle. “Do you see your password? Applying recognition to textual.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Operating Systems Security
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
1 IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo, Jose G. Delgado-Frias Publisher: Journal of Systems.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
3D Password.
1 The Design and Analysis of Graphical Passwords Presenter : Ta Duy Vuong Ian Jermyn New York University Alain Mayer, Fabian Monrose,
7/10/20161 Computer Security Protection in general purpose Operating Systems.
PASSWORD SECURITY A Melbourne Athenaeum Library
Authentication Schemes for Session Passwords using Color and Images
IMAGE-BASED AUTHENTICATION
Setting up an online account
Lesson 2: Epic Security Considerations
REVISITING DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS Mansour Alsaleh,Mohammad Mannan and P.C van Oorschot.
Lesson 2: Epic Security Considerations
The Design and Analysis of Graphical Passwords
Lesson 2: Epic Security Considerations
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert BiddleAlain ForgetSonia ChiassonPaul C. van OorschotRobert Biddle

A UTHENTICATION M ETHODS Token based authentication(which you have) Biometric based authentication(which you are) Knowledge based (which you know) Text Based Graphical Password Recognition based Recall based Repeat a drawing Repeat a sequence of action

W HY USE G RAPHICAL P ASSWORD ? Human can remember pictures better than text Text Password memorable passwords easy for attackers to guess, but strong system-assigned passwords di ffi cult for users to remember Reusing same passwords across many accounts increases the potential impact if one account is compromised. Biometric based authentications Expensive and inconvenient Biometric information is part of a person’s identity leads to privacy concern

P ERSUASIVE C UED C LICK -P OINTS (PCCP) Click-Points one click-point on different images shown in sequence Cued Next image displayed is based on the location of the previously entered click-point Persuasive encouraging users to select more random point, and hence more difficult to guess, click-points.

L OGIN IN PCCP S YSTEM Sequence of images is presented User must choose one click-point per image First image assigned by the system, but subsequent image is determined by the user’s previous click. It provides users feedback about the correctness of password entry at every attempt User see correct image only after clicking in correct tolerance square of previous image Not useful for attacker who don’t know the correct image sequence

R EGISTRATION IN PCCP Sequence of images is presented Each image have a randomly highlighted region called viewport User has to choose a point within viewport Shuffle button is provided to change the position of viewport to a random position User can use shuffle button if he unable to find a memorable point within current viewport Random viewport persuades user to choose point at random location. Thus increases security

T EXT P ASSWORD VS PCCP Theoretical Password Space,(TPS) :- Total number of unique password can be generated according to system specification For Text Password TPS = 95 n 95 number of typeable character on US keyboard n is length of password For PCCP TPS = ((w * h)/t 2 ) c w*h :- size of image in pixel t 2 :- size of tolerance square c :- number of click-points

TPS of an 8-character password is (2 53 or 53 bits) which is equal to PCCP password of small image size (451 x 331) pixel and 6 click-points Large image size (800 x 600) pixel and 5 click-points So PCCP provide equal password space as of Text password.

U SABILITY Large images and more click-point increases the theoretical password space but decreases usability. Achieve better usability & memorability for approximately equivalent password space. Hypothesis: Increasing the number of click-points will decrease usability. Increasing the size of the image will decrease usability. For conditions with approximately comparable theoretical password spaces, the condition with the larger image size will have better usability

E XPERIMENT A between-subjects design was used, and the 82 participants (47 females and 35 males) were randomly assigned. Participants created and re-entered PCCP password for six fictitious accounts. In their second session, participants tried to re- enter these same six passwords.

U SABILITY R ESULTS Success Rates Lower value of p in session-2 supports both the Hypothesis 1 & 2.

U SABILITY R ESULTS Time spent on creating and entering password increases with the click-points. Errors According to mean errors shown in table, large images causes users to make more mistakes.

ANALYSIS OF PASSWORD DISTRIBUTIONS Click-point clustering Passwords should be as random as possible while still maintaining memorability. Different users tend to select similar click-points creating what are known as hotspots.

Click-point clustering Test indicates significantly less clustering for larger images.

H OTSPOT COVERAGE PCCP is close enough to a randomly distributed click-points (straight diagonal line); Viewport and shuffling reduces hotspots in the image.

S ECURITY : G UESSING A TTACK Pattern-based attack automated pattern based dictionary attack that prioritizes passwords consisting of click-points ordered in a consistent horizontal and vertical direction. PCCP passwords are essentially indistinguishable from random for click-point distributions Hotspot attack PassPoints passwords from a small number of users can be used to determine likely hotspots on an image, which can then be used to form an attack dictionary. For attacker, things are difficullt as hotspots reduced, sequence of images need to be determined,

S ECURIY : C APTURE A TTACKS Shoulder-surfing Malware Malware is a major concern for text and graphical passwords, since keylogger, mouse-logger, and screen scraper malware could send captured data remotely or otherwise make it available to an attacker. Social engineering and phishing is more difficult for PCCP than for text passwords or PassPoints sue to PCCP’s multiple images.

C ONCLUSION Graphical passwords provide plausible alternatives to text based password and biometric authentications It is generally more difficult to break graphical passwords using the traditional attack methods such as brute force search, dictionary attack, or spyware.