Graphical VS Textual Presented by Ding Li Nicholas Wright, Andrew S. Patrick, and Robert Biddle. “Do you see your password? Applying recognition to textual.

Slides:



Advertisements
Similar presentations
SeeYou LBS Location Solution For SOHO, Friends & Family.
Advertisements

This is a title Author 1, Author 2 This is a conferenceNovember 2009 University of Magdeburg | Computer Science User Interface & Software Engineering Group.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.
3d ..
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Usable Authentication Research with the MVP Framework Robert Biddle Carleton University, Ottawa Sonia Chiasson, Chris Deschamps,
Part 2c: Requirements Chapter 2: How to Gather Requirements: Some Techniques to Use Chapter 3: Finding Out about the Users and the Domain Chapter 4: Finding.
User Authentication Rachna Dhamija Human Centered Computing Course December 6, 1999 Image Recognition in.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Graphical Dictionaries Presentation by Roger Kahn1 Graphical Dictionaries & Memorable Space of Graphical Passwords.
Studying Abroad Raquel Martinez, Nicholas Thompkins, and Nahnyonga Todmia.
BY SHAWN BYNUM How to send and receive text information.
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Chat has enormous potential to link students around the world in real time. Chat has enormous potential to link students around the world in real.
ACC Online Services and Online Registration. Guess What? Telephone Registration Has Gone Away...It Is Time To Go Online! Part 1: Obtaining Your ACCeID.
Information Systems Security for the Special Educator MGMT 636 – Information Systems Security.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.
E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson,
$ocial Media and Networking. 44% of Milwaukee Area home buyers used social networking websites. Among those 18 to 24, 74% used social networking sites,
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
MyBCommLab First Day of Class Registration Walkthrough.
Article Title: “Token-based Graphical Password Authentication” Authors: John Charles Gyorffy Andrew F. Tappenden James Miller Presenter: Patrick Centanni.
WELCOME.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Senior Project Lei Ding. Determine what to do? Art? Sports? Films? Photography? Chinese Culture? Business !!!
Textual Password How to use the Textual Authentication Model (AC)
Password Management Strategies for Online Accounts Shirley Gaw, Edward W. Felten Princeton University.
“L  kout” Initiative Choosing a Strong Password.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Graphical Passwords Possible Collaborative Project Usable Security – CS 6204 – Fall,
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
3D PASSWORD FOR SECURE AUTHENTICATION
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
Workshop site:
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Presented by Sharan Dhanala
 Patrick Gage Kelley, et al. “Guess again (and again and again): [...].” In 2012 IEEE Symposium on Security and Privacy (SP), pp IEEE, 2012.
WINDOWS 10 What’s New? What’s Different?. Who Are We? Cody Pierson Marketing Manager Prophet Business Group Patrick Wall IT Technician Prophet Business.
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model (Short Paper) FC 2010 Toni Perković joint work with Mario Čagalj and Nitesh Saxena.
Versatrans E-Link Parent look up and review of student Transportation Information.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
CAP Malware and Software Vulnerability Analysis Term Project Proposal - Spring 2009 Professor: Dr. Zou Team members: Andrew Mantel & Peter Matthews.
If you believe that your password has been compromised because someone else knows it, then you learn to modify it. How do I change my Hotmail login password?
TING-YI CHANG ( 張庭毅 ) Phone: EXT 7381 GRADUATE INSTITUTE OF E-LEARNING, NATIONAL CHANGHUA UNIVERSITY OF EDUCATION.
3D Password.
English Urdu Dictionary easy way to learn Urdu Translation on iPhone Interested in learning how to speak and write Urdu? If you want to speak fluent Urdu,
Towards Another Step from 3D Password to 4D Password:
Android App Permission Manager
Authentication Schemes for Session Passwords using Color and Images
Investigation of Instructions for Password Generation
WRITE MARKETING COPY and EXECUTE TARGETED S
Are you Human?.
Roadrunner Not Working? If Roadrunner is not working,you can directly contact us on Roadrunner Technical Support Number Roadrunner Toll Free Number:
Solutions of Hotmail Problems Source Hotmail Issue.
Discrete Structures for Computer Science
Security Indicators and Warnings
WRITE MARKETING COPY and EXECUTE TARGETED S
Registering for MOS Exam
REU Summer Research in Computer Security
Register for MFA Quick and Easy Steps.
Account Recovery – Authentication's Dirty Secret?
Online Practice and On the Move Registration tutorial
Registering for MOS Exam
Presentation transcript:

Graphical VS Textual Presented by Ding Li Nicholas Wright, Andrew S. Patrick, and Robert Biddle. “Do you see your password? Applying recognition to textual passwords.” In Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 8. ACM, 2012.

From the article "Text password systems could potentially benefit from the work that has gone into the development of the new recognition- based methods, without resorting to the use of graphical materials. " "Twenty-nine (or 80.6%) of respondents had English as a first language, and the other seven (or 19.4%) spoke English as a second language."

How people choose textual password Easy to rememberHard to guess my brithday my phone num or my brithday+phone num

Why we need a graphical password more human- friendly passwords 15z8h69xA35!

Is a graphical password as secure as text- based passwords? NAMEText-base Recognition Based Techniques Recall Based Techniques PASSWORD SPEACE 94^NN!/K! (N-K)!Unlimited Attack brute-force dictionary guessing spy software shoulder surfing brute-force guessing shoulder surfing dictionary guessing shoulder surfing

Drawback Password registration and log-in process take too long. Require much more storage space than textual/character passwords. Shoulder surfing

Possible solution

Summary Although there could be new recognition- based methods for textual password, but the language barriers still exist Password should be more humen-friendly.

Question ?