Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2523649.2523672acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Revisiting graphical passwords for augmenting, not replacing, text passwords

Published: 09 December 2013 Publication History

Abstract

Users generally choose weak passwords which can be easily guessed. On the other hand, adoption of alternatives to text passwords has been slow due to cost and usability factors. We acknowledge that incumbent passwords remain difficult to beat and introduce in this study Type&Click (T&C), a hybrid scheme supporting text passwords with the graphical passwords. In T&C, users first type a text as usual and then make a single click on an image to complete the password entry. While largely preserving the login experience with the text passwords, the new scheme utilizes accumulated scientific knowledge in graphical password research (implicit feedback, persuasion during password creation, leveraging cued recall memory). The results of our user study suggest that T&C is promising for augmenting text passwords for improved security without degrading usability.

References

[1]
The science behind passfaces. www.realuser.com/published/ScienceBehindPassfaces.pdf. Accessed: 03/03/2012.
[2]
Weak password brings 'happiness' to twitter hacker. www.wired.com/threatlevel/2009/01/professed-twitt. Accessed: 03/03/2013.
[3]
K. Bicakci, N. Atalay, M. Yuceel, H. Gurbaslar, and B. Erdeniz. Towards usable solutions to graphical password hotspot problem. In Computer Software and Applications Conference, 2009. COMPSAC'09. 33rd Annual IEEE International, volume 2, pages 318--323. IEEE, 2009.
[4]
K. Bicakci, N. B. Atalay, M. Yuceel, and P. C. van Oorschot. Exploration and field study of a browser-based password manager using icon-based passwords. In Workshop on Real-Life Cryptographic Protocols and Standardization, 2011.
[5]
R. Biddle, S. Chiasson, and P. C. van Oorschot. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys 44(4), 2011.
[6]
J. Bonneau. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In IEEE Symposium on Security and Privacy, pages 538--552, 2012.
[7]
J. Bonneau. Statistical metrics for individual password strength. In 20th International Workshop on Security Protocols, 2012.
[8]
J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In IEEE Symposium on Security and Privacy, pages 553--567, 2012.
[9]
J. Bonneau and S. Preibusch. The password thicket: technical and market failures in human authentication on the web. In Proc. WEIS, 2010.
[10]
S. Brostoff and M. Sasse. Are passfaces more usable than passwords? a field trial investigation. People and Computers, pages 405--424, 2000.
[11]
W. Burr. Electronic authentication guideline. NIST special publication, 800:63.
[12]
S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. C. van Oorschot. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Trans. Dependable Sec. Comput., 9(2):222--235, 2012.
[13]
R. Dhamija and A. Perrig. Déjà vu: A user study using images for authentication. In Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, SSYM'00, pages 4--4, Berkeley, CA, USA, 2000. USENIX Association.
[14]
M. Hart, C. Castille, M. Harpalani, J. Toohill, and R. Johnson. Phorcefield: a phish-proof password ceremony. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 159--168. ACM, 2011.
[15]
C. Herley and P. C. van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 10(1):28--36, 2012.
[16]
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium, pages 1--14. Washington DC, 1999.
[17]
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 523--537. IEEE, 2012.
[18]
W. Khan, Y. Xiang, M. Aalsalem, and Q. Arshad. A hybrid graphical password based system. In ICA3PP 2011 Workshops, Part II, LNCS 7017, pages 153--164, 2011.
[19]
C. Singh, L. Singh, C. Singh, and L. Singh. Investigating the combination of text and graphical passwords for a more secure and usable experience. International Journal of Network Security & Its Applications (IJNSA), 3(2), 2011.
[20]
P. C. van Oorschot and T. Wan. Twostep: An authentication method combining text and graphical passwords. In MCETECH, pages 233--239, 2009.

Cited By

View all
  • (2021)HyPA: A Hybrid Password-Based Authentication MechanismAdvances in Information and Communication10.1007/978-3-030-73100-7_47(651-665)Online publication date: 13-Apr-2021
  • (2018)User Define Time Based Change Pattern Dynamic Password Authentication Scheme2018 14th International Conference on Electronics Computer and Computation (ICECCO)10.1109/ICECCO.2018.8634675(206-212)Online publication date: Nov-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
December 2013
374 pages
ISBN:9781450320153
DOI:10.1145/2523649
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 December 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. graphical passwords
  3. passwords
  4. usable security

Qualifiers

  • Research-article

Conference

ACSAC '13
Sponsor:
  • ACSA
ACSAC '13: Annual Computer Security Applications Conference
December 9 - 13, 2013
Louisiana, New Orleans, USA

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)HyPA: A Hybrid Password-Based Authentication MechanismAdvances in Information and Communication10.1007/978-3-030-73100-7_47(651-665)Online publication date: 13-Apr-2021
  • (2018)User Define Time Based Change Pattern Dynamic Password Authentication Scheme2018 14th International Conference on Electronics Computer and Computation (ICECCO)10.1109/ICECCO.2018.8634675(206-212)Online publication date: Nov-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media