Visual Authentication Mechanisms. Rationale “Human memory for images is better than for words” Human memory for faces in particular is extremely good.

Slides:



Advertisements
Similar presentations
Sonny J Zambrana University of Pennsylvania ISC-SEO November 2008.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Password Cracking Lesson 10. Why crack passwords?
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Access Control Methodologies
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.
13: Unlucky for some? …or how to test your WLAN passwords to make sure that it’s the hacker who is “unlucky” Ian Hughes Wireless Security Consultant
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
05-899/ Usable Privacy and Security Colleen Koranda February 7, 2006 Usable Privacy and Security I.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Trustworthy User Interface Design: Dynamic Security Skins Rachna Dhamija and J.D. Tygar University of California, Berkeley TIPPI Workshop June 13, 2005.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
How to Login into SSA ?. Home Page Click on My Profile.
Macular Degeneration and the skill of Eccentric Viewing Presented By: Nancy Parkin-Bashizi, M.A., COMS, CVRT Program Director, Lead Teacher Vision Rehabilitation.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
1 Authentication and access control overview. 2 Outline Definitions Authentication Factors Evaluation Examples  Focus on password problems and alternatives.
CIS 450 – Network Security Chapter 8 – Password Security.
File Protection Mechanisms  All-None Protection Lack of trustLack of trust All or nothingAll or nothing Timesharing issuesTimesharing issues ComplexityComplexity.
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Test taking Strategies.  Neural traces created in the brain  Linkages or connections between neurons  Chemical bond caused by strong association 
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Security CS Introduction to Operating Systems.
Security in Computing Protection in General-Purpose Operating Systems.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
Authentication What you know? What you have? What you are?
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Policies and Security for Internet Access
COOKIES AND SESSIONS.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Understanding Security Policies Lesson 3. Objectives.
Lecture 7 Page 1 CS 236, Spring 2008 Authentication CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Password Management Limit login attempts Encrypt your passwords
Computer Security Protection in general purpose Operating Systems
COEN 351 Authentication.
Presentation transcript:

Visual Authentication Mechanisms

Rationale “Human memory for images is better than for words” Human memory for faces in particular is extremely good.

Graphical Cues - Passfaces 1 response, 8 distractors 4 panels High recall rates after long periods of non-use

Passfaces Pros –Good recall rates even after long periods of non-use (95% after one week, ~90% after up to 3 months) Cons –load on end-system and network –Takes longer than standard password; not suitable for frequent tasks (see Brostoff & Sasse, 2000) –performance plummets with change more than one set of faces is used

Graphical cues - Déjà vu User creates image portfolio, selecting random art images from a set System presents challenge set, user picks correct response –n portfolio images from set of m distractors –1 image from n sets

Déjà vu Pros –Registration is faster than photo –Better recall rates (90%) after one week than password or PINs (65%) but worse than photo Cons –70% of random art images are usable – selection must be done by hand –Registration & login take longer than than PINs, passwords, or photographs –Image files must be stored on trusted and secured server (Kerberos)

Graphical passwords – v-go User clicks on a selected number of objects in particular order

Single sign-on Central service for authentication and changing passwords Server- or client-based Password-based, graphics-based –e.g. Passlogix v-go SSO Biometric-based –e.g. Siemens ID mouse plus ID Centre

Single sign-on Pros –Reduces number of user_ids and passwords –Can incorporate policies (e.g. password content and change regimes) Cons –High cost of retro-fitting –Needs to be very well set up and administred to work (users will have no idea about “downstream passwords) –Server-based provides point of failure/vulnerability

Compound Weak Clues Pros –Can use memorable clues –Can be configured to tolerate some misses Cons –Takes longer than standard login –Users often still unsure of “correct” answer e.g. “Fake” answers to protect themselves Different ways of referring to first school –Clues are not a secret

Example: Compound Clues in Telephone Banking Q: Letter 2 and 4 of your password? A: i, and i Q: First and last digit of your PIN? A: 6 and 9 Q: What is your mother’s maiden name? A: Kummerbund Q: First school you visited? A: Ampleforth

Passfaces Use homogeneous image sets (same gender, same ethnicity) With multiple passwords, different image sets can be used

Compound Weak Clues, v. 2 Q: Your password? A: indiana Q: Your PIN? A: 6789 Q: What is your mother’s maiden name? A: Kummerbund Q: First school you visited? A: Ampleforth

Compound weak clues Are clues a secret? If not, users may attempt to “fix” this by generating “fake” answers, then have trouble recalling that/how they faked it.

Changes to policies Increase number of login attempts –Many users succeed on 4 th, 5 th, 6 th attempt (see Brostoff & Sasse, 2003) Allow usage of same password on several systems Decrease frequency of password changes

Personal Entropy (2) Reminder: Draw on strong personal memories that are well-established in long- term memory (childhood).

“Choosing good questions is difficult but probably the most important part of the system.” C. Ellison, C. Hall, R. Milbert & B. Schneier: Protecting secret keys with personal entropy.

Example questions Q: First song I danced to with an unrelated member of the opposite sex? Q: First car I wish I could have owned? Q: First car I drove? Q: Where was I during my first romantic kiss?

Example questions 1) Response to the sentence “I really like the clever way you ________” 2) (first) (last) (past) (prep) on the timetable 3) (past) (first) (last) in the swimming pool

Custom questions “It takes considerable time to get into the right frame of mind. However, once in that frame of mind, it is possible to generate prompts at the rate of about 1 per minute.” C. Ellison, C. Hall, R. Milbert & B. Schneier: Protecting secret keys with personal entropy.

Mnemonic techniques (1) Make up sentence to memorise password or PIN –Personal entropy –funny, outrageous content helps to memorise (and prevents disclosure) –Tie word to name of system or application (especially for owners of multiple passwords) –Repeat often during day of construction

Examples Make up sentence on randomly generated phrase m,1aNibs0n Make up your own phrase wm”&itMoG Abbreviate and contract several words and use SALT

Mnemonic techniques (2) Play to users’ memory strength –Visual (images) n5us3Ff –Perceptual-motor (keyboard) Ydceid[z –Rhymes, songs, poems W1’m64

Mnemonic techniques (3) Use context as cue or mnemonic –Physical environment –Workspace –People  v-go graphical passwords

Personal Entropy Encrypting a password or passphrase using answers to several personal questions. Users can forget answers to a subset of questions and still recover the personal key. –Split long passphrase into several short ones that are independent of each other; effort of guessing equivalent to brute force attack. –Each encrypt each question separately, use personal hints to recover.

Pro-active password checking Purpose: prevent weak passwords Regular checks on password file (sysadmin mimicks hacker) Immediate feedback at registration stage is better Feedback should be polite and constructive Complex policies on password content + unhelpful password checker = very frustrated user

Exercise Design a visual authentication system.