Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1920261.1920273acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Exploring usability effects of increasing security in click-based graphical passwords

Published: 06 December 2010 Publication History

Abstract

Graphical passwords have been proposed to address known problems with traditional text passwords. For example, memorable user-chosen text passwords are predictable, but random system-assigned passwords are difficult to remember. We explore the usability effects of modifying system parameters to increase the security of a click-based graphical password system. Generally, usability tests for graphical passwords have used configurations resulting in password spaces smaller than that of common text passwords. Our two-part lab study compares the effects of varying the number of click-points and the image size, including when different configurations provide comparable password spaces. For comparable spaces, no usability advantage was evident between more click-points, or a larger image. This is contrary to our expectation that larger image size (with fewer click-points) might offer usability advantages over more click-points (with correspondingly smaller images). The results suggest promising opportunities for better matching graphical password system configurations to device constraints, or capabilities of individual users, without degrading usability. For example, more click-points could be used on smart-phone displays where larger image sizes are not possible.

References

[1]
M. Anderson and J. Neely. Interference and inhibition in memory retrieval. In E. Bjork and R. Bjork, editors, Handbook of Perception and Cognition, pages 237--313. Academic Press, 1996.
[2]
A. Baddeley and R. Turner. R. Spatstat: An R package for analyzing spatial point patterns. Journal of Statistical Software, 12(6):1--42, 2005.
[3]
K. Bicakci, M. Yuceel, B. Erdeniz, H. Gurbaslar, and N. Atalay. Graphical Passwords as Browser Extension: Implementation and Usability Study. In Third IFIP WG 11.11 International Conference on Trust Management, Purdue University, USA, June 2009.
[4]
R. Biddle, S. Chiasson, and P. C. van Oorschot. Graphical passwords: Learning from the first generation. Technical Report TR-09-09, Computer Science, Carleton University, www.scs.carleton.ca/research/tech_reports, 2009.
[5]
S. Chiasson, R. Biddle, and P. C. van Oorschot. A second look at the usability of click-based graphical passwords. In 3rd Symposium on Usable Privacy and Security (SOUPS), July 2007.
[6]
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. Influencing users towards better passwords: Persuasive Cued Click-Points. In Human Computer Interaction (HCI), British Computer Society, 2008.
[7]
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. User interface design affects security: Patterns in click-based graphical passwords. International Journal of Information Security, 8(6):387--398, 2009.
[8]
S. Chiasson, P. C. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In 15th USENIX Security Symposium. Usenix, August 2006.
[9]
R. G. Crowder and R. L. Greene. Serial Learning: Cognition and Behaviour. In E. Tulving and F. I. Craik, editors, The Oxford Handbook of Memory, chapter 8. Oxford University Press, 2000.
[10]
D. Davis, F. Monrose, and M. Reiter. On user choice in graphical password schemes. In 13th USENIX Security Symposium, August 2004.
[11]
A. De Angeli, L. Coventry, G. Johnson, and K. Renaud. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63(1--2):128--152, 2005.
[12]
S. Designer. John the Ripper password cracker. http://www.openwall.com/john/.
[13]
R. Dhamija and A. Perrig. Déjà Vu: A user study using images for authentication. In 9th USENIX Security Symposium, August 2000.
[14]
P. Diggle. Statistical Analysis of Spatial Point Patterns. Academic Press: New York, NY, 1983.
[15]
A. Dirik, N. Menon, and J. Birget. Modeling user choice in the Passpoints graphical password scheme. In 3rd ACM Conference on Symposium on Usable Privacy and Security (SOUPS), July 2007.
[16]
A. Duchowski. Eye Tracking Methodology: Theory and Practice. Springer, 2nd edition, 2007.
[17]
D. Florencio and C. Herley. A large-scale study of WWW password habits. In 16th ACM International World Wide Web Conference (WWW), May 2007.
[18]
S. Gaw and E. Felten. Password management strategies for online accounts. In 2nd Symposium On Usable Privacy and Security (SOUPS), July 2006.
[19]
K. Golofit. Click passwords under investigation. In 12th European Symposium On Research In Computer Security (ESORICS), LNCS 4734, September 2007.
[20]
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In 8th USENIX Security Symposium, August 1999.
[21]
L. Jones, A. Anton, and J. Earp. Towards understanding user perceptions of authentication technologies. In ACM Workshop on Privacy in Electronic Society, 2007.
[22]
I. S. MacKenzie. Fitts' law as a research and design tool in human-computer interaction. Human-Computer Interaction, 7(1):91--139, 1992.
[23]
D. Nelson, V. Reed, and J. Walling. Pictorial Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory, 2(5):523--528, 1976.
[24]
K. Renaud. Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and Computer Security, 3(1):60--85, June 2009.
[25]
M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'weakest link' -- a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122--131, July 2001.
[26]
X. Suo, Y. Zhu, and G. Owen. Graphical passwords: A survey. In Annual Computer Security Applications Conference (ACSAC), December 2005.
[27]
H. Tao and C. Adams. Pass-Go: A proposal to improve the usability of graphical passwords. International Journal of Network Security, 7(2):273--292, 2008.
[28]
M. van Lieshout and A. Baddeley. A nonparametric measure of spatial interaction in point patterns. Statistica Neerlandica, 50(3):344--361, 1996.
[29]
P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe. Purely automated attacks on passpoints-style graphical passwords. IEEE Trans. Info. Forensics and Security, 5(9):393--405, 2010.
[30]
P. C. van Oorschot and J. Thorpe. Exploiting predictability in click-based graphical passwords. Journal of Computer Security, to appear, 2011.
[31]
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Effects of tolerance and image choice. In 1st Symposium on Usable Privacy and Security (SOUPS), July 2005.

Cited By

View all
  • (2023)Resisting Visual Hacking: A Novel Graphical Password Authentication System2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)10.1109/ICPCSN58827.2023.00155(910-915)Online publication date: Jun-2023
  • (2021)Implementing Multilevel Graphical Password Authentication Scheme in Combination with One Time PasswordInternational Conference on Innovative Computing and Communications10.1007/978-981-16-2594-7_2(11-28)Online publication date: 18-Aug-2021
  • (2021)Exploring the Effect of Resolution on the Usability of Locimetric AuthenticationHCI International 2021 - Late Breaking Papers: Design and User Experience10.1007/978-3-030-90238-4_27(387-396)Online publication date: 20-Nov-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '10: Proceedings of the 26th Annual Computer Security Applications Conference
December 2010
419 pages
ISBN:9781450301336
DOI:10.1145/1920261
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 December 2010

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ACSAC '10
Sponsor:
  • ACSA

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Resisting Visual Hacking: A Novel Graphical Password Authentication System2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)10.1109/ICPCSN58827.2023.00155(910-915)Online publication date: Jun-2023
  • (2021)Implementing Multilevel Graphical Password Authentication Scheme in Combination with One Time PasswordInternational Conference on Innovative Computing and Communications10.1007/978-981-16-2594-7_2(11-28)Online publication date: 18-Aug-2021
  • (2021)Exploring the Effect of Resolution on the Usability of Locimetric AuthenticationHCI International 2021 - Late Breaking Papers: Design and User Experience10.1007/978-3-030-90238-4_27(387-396)Online publication date: 20-Nov-2021
  • (2020)CogniPGA: Longitudinal Evaluation of Picture Gesture Authentication with Cognition-Based Interventioni-com10.1515/icom-2019-001118:3(237-257)Online publication date: 14-Jan-2020
  • (2020)Comparison Between BlindLogin and Other Graphical Password Authentication SystemsAdvances in Cyber Security10.1007/978-981-15-2693-0_17(235-246)Online publication date: 17-Jan-2020
  • (2019)Personal Mobile devices at work: factors affecting the adoption of security mechanismsMultimedia Tools and Applications10.1007/s11042-019-7349-2Online publication date: 26-Feb-2019
  • (2018)Towards gaze-based quantification of the security of graphical authentication schemesProceedings of the 2018 ACM Symposium on Eye Tracking Research & Applications10.1145/3204493.3204589(1-5)Online publication date: 14-Jun-2018
  • (2017)Security and Verification of Server Data Using Frequent Itemset Mining in EcommerceInternational Journal of Synthetic Emotions10.4018/IJSE.20170101038:1(31-43)Online publication date: 1-Jan-2017
  • (2017)Someone in Your Contact List: Cued Recall-Based Textual PasswordsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.271212612:11(2574-2589)Online publication date: Nov-2017
  • (2017)Discovering Trends for the Development of Novel Authentication Applications for Dementia PatientsInternational Conference on Applications and Techniques in Cyber Security and Intelligence10.1007/978-3-319-67071-3_29(220-237)Online publication date: 21-Oct-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media