DMCA
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism (2011)
Cached
Download Links
Citations: | 30 - 2 self |
Citations
649 |
Persuasive technology: using computers to change what we think and do
- Fogg
(Show Context)
Citation Context ...gh attackers must perform proportionally more work to exploit hotspots, results showed that hotspots remained a problem [2]. Persuasive Technology: Persuasive Technology was first articulated by Fogg =-=[22]-=- as using technology to motivate and influence people to behave in a desired manner. An authentication system which applies Persuasive Technology should guide and encourage users to select stronger pa... |
509 |
Statistical Analysis of Spatial Point Patterns (Academic,
- Diggle
- 1983
(Show Context)
Citation Context ...est recall success rates. 6 ANALYSIS OF PASSWORD DISTRIBUTIONS 6.1 Click-point clustering To analyze the randomness and clustering of 2D spatial data across users, we turned to point pattern analysis =-=[30]-=- commonly used in biology and earth sciences. The analysis used spatstat [31], a spatial statistics package for the R programming language. The J-statistic [32] from spatial analysis was used to measu... |
355 |
Eye tracking methodology: theory and practice
- Duchowski
- 2007
(Show Context)
Citation Context ...e human eye can observe only a small part of an image at a time. Selecting a click-point requires high acuity vision using the fovea, the area of the retina with a high density of photoreceptor cells =-=[38]-=-. The size of the fovea limits foveal vision to an angle of approximately 1◦ within the direct line to the target of interest. At a normal viewing distance for a computer screen, say 60cm, this result... |
206 | Spatstat: An R Package for Analyzing Spatial Point Patterns.
- Badeley, Turner
- 2005
(Show Context)
Citation Context ...t clustering To analyze the randomness and clustering of 2D spatial data across users, we turned to point pattern analysis [30] commonly used in biology and earth sciences. The analysis used spatstat =-=[31]-=-, a spatial statistics package for the R programming language. The J-statistic [32] from spatial analysis was used to measure clustering of click-points within datasets (the formation of hotspots). Th... |
182 | Biometrics: A tool for information security
- Jain, Ross, et al.
- 2006
(Show Context)
Citation Context .... 2 BACKGROUND Text passwords are the most popular user authentication method, but have security and usability problems. Alternatives such as biometric systems and tokens have their own drawbacks [8]–=-=[10]-=-. Graphical passwords offer another alternative, and are the focus of this paper. Click-based graphical passwords: Graphical password systems are a type of knowledge-based authentication that attempt ... |
162 | Availability versus accessibility of information in memory for words.
- Tulving, Pearlstone
- 1966
(Show Context)
Citation Context ...call click-based graphical passwords (also known as locimetric [13]). In such systems, users identify and target previously selected locations within one or more images. The images act as memory cues =-=[14]-=- to aid recall. Example systems include PassPoints [15] and Cued Click-Points [7]. In PassPoints, passwords consist of a sequence of five click-points on a given image. Users may select any pixels in ... |
160 | PassPoints: Design and longitudinal evaluation of a graphical password system.
- Wiedenbeck, Waters, et al.
- 2005
(Show Context)
Citation Context ...imetric [13]). In such systems, users identify and target previously selected locations within one or more images. The images act as memory cues [14] to aid recall. Example systems include PassPoints =-=[15]-=- and Cued Click-Points [7]. In PassPoints, passwords consist of a sequence of five click-points on a given image. Users may select any pixels in the image as click-points for their password. To log in... |
142 | On user choice in graphical passwords schemes.
- Davis, Monrose, et al.
- 2004
(Show Context)
Citation Context ...ple are attracted to the same predictable areas on an image. This suggests that if users select their own click-based graphical passwords without guidance, hotspots will remain an issue. Davis et al. =-=[24]-=- suggest that user choice in all types of graphical passwords is inadvisable due to predictability. We investigated whether the system could influence users to select more random click-points while ma... |
114 | Securing passwords against dictionary attacks.
- Pinkas, Sander
- 2002
(Show Context)
Citation Context ...er t failed login attempts, defences must throttle such online guessing attacks sufficiently to guard against system-wide attacks across W accounts since an attacker gets t ∗W guesses per time window =-=[37]-=-. All client-server communication should be made securely (e.g., through SSL) to maintain the secrecy of user click-points and images. 7.3 Summary of Security Analysis Given that hotspots and click-po... |
94 | Comparing passwords, tokens and biometrics for user authentication”, - O’Gorman - 2003 |
88 |
Pictorial superiority effect.
- Nelson, Reed, et al.
- 1976
(Show Context)
Citation Context ... are the focus of this paper. Click-based graphical passwords: Graphical password systems are a type of knowledge-based authentication that attempt to leverage the human memory for visual information =-=[11]-=-. A comprehensive review AUTHORS’ COPY: TO APPEAR IN IEEE TDSC 2 Fig. 1. A user navigates through images to form a CCP password. Each click determines the next image. of graphical passwords is availab... |
87 | Graphical password authentication using Cued Click Points.
- Chiasson, Oorschot, et al.
- 2007
(Show Context)
Citation Context ...ated evaluation of PCCP covering both usability and security issues, to advance understanding as is prudent before practical deployment of new security mechanisms. Through eight user studies [1]–[4], =-=[7]-=-, we compared PCCP to text passwords and two related graphical password systems. Results show that PCCP is effective at reducing hotspots (areas of the image where users are more likely to select clic... |
79 |
Testing metrics for password creation policies by attacking large sets of revealed passwords.
- Weir, Aggarwal, et al.
- 2010
(Show Context)
Citation Context ... space for authentication schemes, Florencio and Herley [26] suggest that theoretical password spaces of 220 suffice to withstand online attacks. Whereas text passwords have very skewed distributions =-=[27]-=-, resulting in an effective password space much smaller than the theoretical space, PCCP is specifically designed to significantly reduce such skews. Further design and implementation details of PCCP ... |
70 | Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. USENIX Security Symp.
- Thorpe, Oorschot
- 2007
(Show Context)
Citation Context ...users as password click-points. Attackers who gain knowledge of these hotspots through harvesting sample passwords can build attack dictionaries and more successfully guess PassPoints passwords [18], =-=[19]-=-. Users also tend to select their click-points in predictable patterns [5], [20] (e.g., straight lines), which can also be exploited by attackers even without knowledge of the background image; indeed... |
68 |
Graphical passwords: Learning from the first generation.
- Biddle, Chiasson, et al.
- 2009
(Show Context)
Citation Context ...sive review AUTHORS’ COPY: TO APPEAR IN IEEE TDSC 2 Fig. 1. A user navigates through images to form a CCP password. Each click determines the next image. of graphical passwords is available elsewhere =-=[12]-=-. Of interest herein are cued-recall click-based graphical passwords (also known as locimetric [13]). In such systems, users identify and target previously selected locations within one or more images... |
58 | A second look at the usability of click-based graphical passwords.
- Chiasson, Biddle, et al.
- 2007
(Show Context)
Citation Context ...ed graphical password system, Persuasive Cued Click-Points (PCCP) [2], [3], and conducted user studies evaluating usability and security. This paper presents a consistent assimilation of earlier work =-=[1]-=-–[4] and two unpublished web studies, reinterprets and updates statistical analysis incorporating larger datasets, provides new evaluation of password distributions, extends security analysis includin... |
55 | Modeling user choice in the PassPoints graphical password scheme.
- Dirik, Menon, et al.
- 2007
(Show Context)
Citation Context ...ed by users as password click-points. Attackers who gain knowledge of these hotspots through harvesting sample passwords can build attack dictionaries and more successfully guess PassPoints passwords =-=[18]-=-, [19]. Users also tend to select their click-points in predictable patterns [5], [20] (e.g., straight lines), which can also be exploited by attackers even without knowledge of the background image; ... |
54 |
Influencing users towards better passwords: Persuasive Cued Click-Points.
- Chiasson, Forget, et al.
- 2008
(Show Context)
Citation Context ... in success rates between high and low shufflers was not statistically significant for the two-week or web studies. Furthermore, users reported favourable opinions of PCCP in post-task questionnaires =-=[2]-=-. Secondly, we compared conditions in the PCCP 2wk study. A general trend indicates that larger images or more click-points negatively impacts the password entry time. No clear pattern emerges between... |
47 |
A nonparametric measure of spatial interaction in point patterns.
- Lieshout, Baddeley
- 1996
(Show Context)
Citation Context ...rs, we turned to point pattern analysis [30] commonly used in biology and earth sciences. The analysis used spatstat [31], a spatial statistics package for the R programming language. The J-statistic =-=[32]-=- from spatial analysis was used to measure clustering of click-points within datasets (the formation of hotspots). The J-statistic combines nearest-neighbour calculations and empty-space measures for ... |
44 | Improving text passwords through persuasion.
- Forget, Chiasson, et al.
- 2008
(Show Context)
Citation Context ...4 rather than vague instructions such as “pick a password that is hard for others to guess”. This persuasive strategy has also been used with some success to increase the randomness of text passwords =-=[40]-=-. Better user interface design can influence users to select stronger passwords. A key feature in PCCP is that creating a harder to guess password is the path-of-least-resistance, likely making it mor... |
43 | Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of GraphicalAuthentication Systems,”
- Angeli, Coventry, et al.
- 2005
(Show Context)
Citation Context ... a CCP password. Each click determines the next image. of graphical passwords is available elsewhere [12]. Of interest herein are cued-recall click-based graphical passwords (also known as locimetric =-=[13]-=-). In such systems, users identify and target previously selected locations within one or more images. The images act as memory cues [14] to aid recall. Example systems include PassPoints [15] and Cue... |
31 | Shoulder-Surfing Resistance with Eye-Gaze Entry in Cued-Recall Graphical Passwords.
- Forget, Chiasson, et al.
- 2010
(Show Context)
Citation Context ...ge may offer some protection, but have not been tested. A considerably more complicated alternative is to make user input invisible to cameras, for example by using eye-tracking as an input mechanism =-=[35]-=-. Malware: Malware is a major concern for text and graphical passwords, since keylogger, mouse-logger, and screen scraper malware could send captured data remotely or otherwise make it available to an... |
28 | User interface design affects security: Patterns in click-based graphical passwords.
- Chiasson, Forget, et al.
- 2009
(Show Context)
Citation Context ...ributions, extends security analysis including rel• All authors are from Carleton University, Ottawa, Canada. E-mail: chiasson@scs.carleton.ca Parts of this paper appeared earlier in publications [1]–=-=[5]-=-. Version: Tuesday 25th October, 2011. Copyright held by the IEEE. Authors’ version for personal use. Not to be offered for sale or otherwise re-printed, re-published or re-used without permission. A ... |
27 | Where do security policies come from?
- Florencio, Herley
- 2010
(Show Context)
Citation Context ...nts in a password (c, usually set to 5 in our experiments). While it is beyond our present scope to establish an acceptable theoretical password space for authentication schemes, Florencio and Herley =-=[26]-=- suggest that theoretical password spaces of 220 suffice to withstand online attacks. Whereas text passwords have very skewed distributions [27], resulting in an effective password space much smaller ... |
24 | Purely Automated Attacks on PassPoints-Style Graphical Passwords,”
- Oorschot, Salehi-Abari, et al.
- 2010
(Show Context)
Citation Context ...so be exploited by attackers even without knowledge of the background image; indeed, purely automated attacks against PassPoints based on image processing techniques and spatial patterns are a threat =-=[21]-=-. A precursor to PCCP, Cued Click-Points (CCP) [7] was designed to reduce patterns and to reduce the usefulness of hotspots for attackers. Rather than five click-points on one image, CCP uses one clic... |
23 | Exploiting Predictability in Click-based Graphical Passwords.
- Oorschot, Thorpe
- 2011
(Show Context)
Citation Context ...al report [33]), such pattern-based attacks would be ineffective against PCCP passwords. Hotspot attack with all server-side information: PassPoints passwords from a small number of users can be used =-=[34]-=- to determine likely hotspots on an image, which can then be used to form an attack dictionary. Up to 36% of passwords on the Pool image were correctly guessed with a dictionary of 231 entries. The at... |
21 | On Purely Automated Attacks and Click-Based Graphical Passwords,”
- Salehi-Abari, Thorpe, et al.
- 2008
(Show Context)
Citation Context ...stem-defined tolerance square of the original click-points. Although PassPoints is relatively usable [1], [15], [16], security weaknesses make passwords easier for attackers to predict. Hotspots [17]–=-=[20]-=- are areas of the image that have higher likelihood of being selected by users as password click-points. Attackers who gain knowledge of these hotspots through harvesting sample passwords can build at... |
20 | Securing Passfaces for Description,”
- Dunphy, Nicholson, et al.
- 2008
(Show Context)
Citation Context ...ng: For social engineering attacks against cued-recall graphical passwords, a frame of reference must be established between parties to convey the password in sufficient detail. One preliminary study =-=[36]-=- suggests that password sharing through verbal description may be possible for PassPoints. For PCCP, more effort may be required to describe each image and the exact location of each click-point. Grap... |
19 | Towards understanding user perceptions of authentication technologies, - Jones, I, et al. - 2007 |
19 |
Click Passwords Under Investigation.
- Golofit
- 2007
(Show Context)
Citation Context ... a system-defined tolerance square of the original click-points. Although PassPoints is relatively usable [1], [15], [16], security weaknesses make passwords easier for attackers to predict. Hotspots =-=[17]-=-–[20] are areas of the image that have higher likelihood of being selected by users as password click-points. Attackers who gain knowledge of these hotspots through harvesting sample passwords can bui... |
17 | Multiple Password Interference in Text and Click-Based Graphical Passwords,”
- Chiasson, Forget, et al.
- 2009
(Show Context)
Citation Context ...ions for a secure password — a feature lacking in most schemes. We applied this approach to create the first persuasive click-based graphical password system, Persuasive Cued Click-Points (PCCP) [2], =-=[3]-=-, and conducted user studies evaluating usability and security. This paper presents a consistent assimilation of earlier work [1]–[4] and two unpublished web studies, reinterprets and updates statisti... |
17 | Centered discretization with application to graphical passwords.
- Chiasson, Srinivasan, et al.
- 2008
(Show Context)
Citation Context ...s were set to 451×331 pixel images, 5 click-points per password, a tolerance region of 19× 19 pixels, and a persuasive viewport of 100×100 pixels. Passwords were encoded using Centered Discretization =-=[29]-=-. Text Web: This study included 21 participants who completed 204 at-home recall trials. The system required text passwords of minimum length 6, including at least one digit and one letter, which give... |
15 |
A large-scale study of WWW password habits
- Florêncio, Herley
- 2007
(Show Context)
Citation Context ...ds that are difficult to remember. Providing instructions on creating secure passwords, using password managers, or providing tools such as strength-meters for passwords have had only limited success =-=[39]-=-. The problem with such tools is that they require additional effort on the part of users creating passwords and often provide little useful feedback to guide users’ actions. In PCCP, creating a less ... |
8 | Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords,”
- Stobert, Forget, et al.
- 2010
(Show Context)
Citation Context ...3 Varying system parameters: PCCP 2wk study We summarize the effects of modifying the number of click-points and the image size on user performance. Detailed results are available in an earlier paper =-=[4]-=-. Success rates: Success rates were very high for login; participants could successfully log in after a short time regardless of number of click-points or image size. Success rates after two weeks wer... |
8 | The Memorability and Security of Passwords,” Security and Usability: Designing Secure Systems That People Can Use - Yan, Blackwell, et al. - 2005 |
3 |
Visual Attention,” Seeing,
- Wolf
- 2000
(Show Context)
Citation Context ...ck-based graphical passwords, as attackers can use skewed password distributions to predict and prioritize higher probability passwords for more successful guessing attacks. Visual attention research =-=[23]-=- shows that different people are attracted to the same predictable areas on an image. This suggests that if users select their own click-based graphical passwords without guidance, hotspots will remai... |
1 |
MVP: A web-based framework for user studies
- Chiasson, Deschamps, et al.
- 2010
(Show Context)
Citation Context ...lding a theoretical space of 243 passwords, unless otherwise specified. No images were repeated between or within passwords for a given user. The web studies (Section 4.3) were conducted with the MVP =-=[28]-=- web-based authentication framework. PCCP was again configured to use 451 × 331 pixel images, 19× 19 tolerance squares, and 5 click-points. Since participants could log in from anywhere, screen size a... |