Results 1 - 10
of
523
On purely automated attacks and click-based graphical passwords
- In Annual Computer Security Applications Conf. (ACSAC
, 2008
"... We present and evaluate various methods for purely automated attacks against click-based graphical passwords. Our purely automated methods combine click-order heuristics with focus-of-attention scan-paths generated from a computational model of visual attention. Our method results in a significantly ..."
Abstract
-
Cited by 21 (7 self)
- Add to MetaCart
We present and evaluate various methods for purely automated attacks against click-based graphical passwords. Our purely automated methods combine click-order heuristics with focus-of-attention scan-paths generated from a computational model of visual attention. Our method results in a
Exploiting Predictability in Click-based Graphical Passwords
, 2010
"... We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both short- and long-term user studies: on ..."
Abstract
-
Cited by 23 (5 self)
- Add to MetaCart
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both short- and long-term user studies
Security Implications of Password Discretization for Click-based Graphical Passwords*
"... Discretization is a standard technique used in click-based graphical passwords for tolerating input variance so that approximately correct passwords are accepted by the system. In this paper, we show for the first time that two representative discretization schemes leak a significant amount of passw ..."
Abstract
- Add to MetaCart
Discretization is a standard technique used in click-based graphical passwords for tolerating input variance so that approximately correct passwords are accepted by the system. In this paper, we show for the first time that two representative discretization schemes leak a significant amount
A Second Look at the Usability of Click-based Graphical Passwords
- ACM SOUPS
, 2007
"... Click-based graphical passwords, which involve clicking a set of user-selected points, have been proposed as a usable alternative to text passwords. We conducted two user studies: an initial lab study to revisit these usability claims, explore for the first time the impact on usability of a wide-ran ..."
Abstract
-
Cited by 58 (15 self)
- Add to MetaCart
Click-based graphical passwords, which involve clicking a set of user-selected points, have been proposed as a usable alternative to text passwords. We conducted two user studies: an initial lab study to revisit these usability claims, explore for the first time the impact on usability of a wide
Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords
"... The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering multiple passwords. This reduces security since users reuse the same password for different systems or reveal other passwords ..."
Abstract
-
Cited by 26 (3 self)
- Add to MetaCart
as they try to log in. We report on a laboratory study comparing recall of multiple text passwords with recall of multiple click-based graphical passwords. In a one-hour session (short-term), we found that participants in the graphical password condition coped significantly better than those in the text
Multiple password interference in text and click-based graphical passwords
, 2008
"... People have difficulty remembering multiple passwords. This results in reduced security as users reuse the same password for different systems or reveal other passwords as they try to log in. It can also lead to reduced privacy, as users may rely on centralized services to manage their passwords. In ..."
Abstract
-
Cited by 17 (7 self)
- Add to MetaCart
. In this paper, we report on a laboratory study comparing recall of multiple ordinary text passwords with recall of multiple click-based graphical passwords. We found that participants in the graphical password condition coped significantly better than those in the text password condition. In particular
Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords
"... Graphical passwords have been proposed to address known problems with traditional text passwords. For example, memorable user-chosen text passwords are predictable, but random system-assigned passwords are difficult to remember. We explore the usability effects of modifying system parameters to incr ..."
Abstract
-
Cited by 8 (3 self)
- Add to MetaCart
to increase the security of a click-based graphical password system. Generally, usability tests for graphical passwords have used configurations resulting in password spaces smaller than that of common text passwords. Our two-part lab study compares the effects of varying the number of click
On Predicting and Exploiting HotSpots in Click-Based Graphical Passwords
- School of Computer Science, Carleton University
, 2010
"... We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both short- and long-term user studies: on ..."
Abstract
-
Cited by 8 (4 self)
- Add to MetaCart
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both short- and long-term user studies
Helping Users Protect Themselves from e-Criminals in Click-Based Graphical Passwords
"... Click-based graphical passwords, like other user-selected passwords, suffer from predictability problems. With click-based graphical passwords, user click-points form hotspots, areas of the image that are more likely to be selected, which e-criminals can predict and use to launch dictionary attacks. ..."
Abstract
- Add to MetaCart
Click-based graphical passwords, like other user-selected passwords, suffer from predictability problems. With click-based graphical passwords, user click-points form hotspots, areas of the image that are more likely to be selected, which e-criminals can predict and use to launch dictionary attacks
Results 1 - 10
of
523