Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Graphical Passwords Possible Collaborative Project Usable Security – CS 6204 – Fall,

Slides:



Advertisements
Similar presentations
Identifying the Elements of A Plot Diagram
Advertisements

Identifying the Elements of A Plot Diagram
Top Secret.
A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
Information Representation
Choose the right picture
Computers for Beginners. Agenda  Environment  Windows (Vista)  Mac (OS X)  Personalization  User Accounts - Passwords  Selective Startup (Windows)
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Graphical Dictionaries Presentation by Roger Kahn1 Graphical Dictionaries & Memorable Space of Graphical Passwords.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
A Brief Glimpse of Web Design By: Samantha Beckett.
CS 352, W12 Eric Happe, Daniel Sills, Daniel Thornton, Marcos Zavala, Ben Zoon ANDROID/IOS RPG GAME UI.
How do people communicate with computers?
E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson,
Usable Security – CS 6204 – Fall, 2 Universal Building Company marketing manager Chong Li.
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny.
4 HTML Basics Section 4.1 Format HTML tags Identify HTML guidelines Section 4.2 Organize Web site files and folder Use a text editor Use HTML tags and.
Framework for Diagnostic Teaching. Framework The framework for diagnostic teaching places a premium on tailoring programs that specifically fit all readers.
IT3 Human Computer Interface [HCI] Human Computer Interfaces Factors that should be considered when designing a Computer Interface.
3D password Umesh ECE.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Presented by the Virginia 4-H Science and Technology Committee.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
CS 352, W12 Eric Happe, Daniel Sills, Daniel Thornton, Marcos Zavala, Ben Zoon ANDROID/IOS RPG GAME UI.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
Web Site Design. Overview Why? Internet and Intranet Common Mistakes. Elements of a Web Site. Structure. Navigation.
A-Level Computing#BristolMet Session Objectives#15 MUST define the term user interface SHOULD describe the characteristics of different UIs and suggest.
Multimedia def. Many forms. Multimedia Text Hyperlinks Images Audio Animation Video Text Hyperlinks Images Audio Animation Video.
(c) 2001 by The McGraw-Hill Companies, Inc. All rights reserved. 1 Multimedia Literacy.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
CS 352, W12 Eric Happe, Daniel Sills, Daniel Thornton, Marcos Zavala, Ben Zoon ANDROID/IOS RPG GAME UI.
Guide to Kerpoof. Click on play to proceed Click for picture Click for Movie Click for Drawing Click to make card Click to make story.
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
How to Make a picture come to life..  At the end of this unit, you and partner will use your knowledge of set design to”  Create a floor plan of a set.
4 HTML Basics Section 4.1 Format HTML tags Identify HTML guidelines Section 4.2 Organize Web site files and folder Use a text editor Use HTML tags and.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Using Geographic Information Systems for Enhanced Security Visualization Matthew.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis.
Double –Click on the Netscape Icon on your desktop The following are a series of steps to help you get started with Netscape Composer.
Rogue Wave By: Theodore Taylor.
Storyboards “A picture is worth a thousand words.” – Confucius.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Make an Icon in Paint. Open Paint – found under the Accessories menu in Start - Programs Image – Attributes – set the size of the picture to 32 x32 pixels.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: Matthew Dunlop Usable Security – CS 6204 –
ANALYSIS BOOT CAMP FALL IN, SOLDIERS!. ANALYSIS How many of you have seen/heard this word before? In the simplest terms, ANALYSIS is a conclusion that.
CONTENT  Introduction Introduction  Operating System (OS) Operating System (OS) Operating System (OS)  Summary Summary  Application Software Application.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
Elements of Drama.
Motivation Vignettes are short, animated stories derived from real life situations which allow students of all ages to analyze various situations Creating.
Choose the right picture Choose the right word. 5.
Identifying the Elements of A Plot Diagram Student Notes.
Elements of Plot. Plot There are 5 elements of plot that form that form the plot of a story When you hear the word plot, how would you define it?
Identifying the Elements of A Plot Diagram Ms. De La O.
Cultural Aspects of Authentication Ron Poet. Graphical Passwords  Use image rather than text.  A picture is worth 1000 words.  Complex image easier.
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Authentication Schemes for Session Passwords using Color and Images
Atomic superhero activity
Comic Master.
Human-Computable Passwords
Comprehension Strategy #2
Dynamic Authentication of Typing Patterns
The Design and Analysis of Graphical Passwords
Implementation of Science and Engineering Practices in the Classroom
Social Navigation as a Model for Usable Security
Write a story about the picture
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Graphical Passwords Possible Collaborative Project Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Motivation Text-based pass-”words” either  Either provide strong guarantees against cracking by properties of length, character selection, lack of pneumonic quality, absence of ties to individual’s characteristics  Or are easy for users to remember without resorting to memory aids that may weaken the password’s security Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Graphical passwords Pictures, icons, images, drawings, etc. are an alternative to textual passwords Hypothesis: people find it easier to remember graphical information than textual information Graphical forms may be harder to “hack” by automated means Forms:  Selection of a graphical element from a menu  Identification of a point in a scene  Selection of a sequence of graphical elements or points that represents a meaningful easily recallable pattern

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Recall-a-story Construct a “story” using a palette of provided images  Choose background  Select and place images on the background Password = Background + ((image 1,position 1 ), … (image n, position n )) Example: starting a barbecue, playing soccer beside the house, dog burns tail on barbecue

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Project Collaborate with Yves Maetz (Thomson Technology Group, France) Build a suitable test environment Design and conduct user studies to assess the usability of tell-a-story graphical passwords against text passwords Issues:  Memorability (short term, long term)  Population (VT students, children?, elderly?)