Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2785830.2785882acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
research-article

Graphical Passwords in the Wild: Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes

Published: 24 August 2015 Publication History

Abstract

Common user authentication methods on smartphones, such as lock patterns, PINs, or passwords, impose a trade-off between security and password memorability. Image-based passwords were proposed as a secure and usable alternative. As of today, however, it remains unclear how such schemes are used in the wild. We present the first study to investigate how image-based passwords are used over long periods of time in the real world. Our analyses are based on data from 2318 unique devices collected over more than one year using a custom application released in the Android Play store. We present an in-depth analysis of what kind of images users select, how they define their passwords, and how secure these passwords are. Our findings provide valuable insights into real-world use of image-based passwords and inform the design of future graphical authentication schemes.

References

[1]
Andriotis, P., Tryfonas, T., Oikonomou, G., and Yildiz, C. A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '13, ACM (New York, NY, USA, 2013), 1--6.
[2]
Biddle, R., Chiasson, S., and Van Oorschot, P. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. 44, 4 (Sept. 2012), 19:1--19:41.
[3]
Bulling, A., Alt, F., and Schmidt, A. Increasing the security of gaze-based cued-recall graphical passwords using saliency masks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '12, ACM (New York, NY, USA, 2012), 3011--3020.
[4]
De Angeli, A., Coventry, L., Johnson, G., and Renaud, K. Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. Int. J. Hum.-Comput. Stud. 63, 1--2 (July 2005), 128--152.
[5]
Everitt, K. M., Bragin, T., Fogarty, J., and Kohno, T. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '09, ACM (New York, NY, USA, 2009), 889--898.
[6]
Harbach, M., von Zezschwitz, E., Fichtner, A., Luca, A. D., and Smith, M. It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception. In Symposium On Usable Privacy and Security (SOUPS 2014), USENIX Association (Menlo Park, CA, July 2014), 213--230.
[7]
Harel, J. Graph-Based Visual Saliency Toolbox for MATLAB, 2006. http://www.vision.caltech.edu/~harel/share/gbvs.php, last accessed: June 4, 2015.
[8]
Harel, J., Koch, C., and Perona, P. Graph-based visual saliency. In Proceedings of the 20th International Conference on Neural Information Processing Systems (2006), 545--552.
[9]
Henze, N., and Pielot, M. App stores: External validity for mobile hci. Interactions 20, 2 (Mar. 2013), 33--38.
[10]
Henze, N., Rukzio, E., and Boll, S. 100,000,000 taps: Analysis and improvement of touch performance in the large. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, MobileHCI '11, ACM (New York, NY, USA, 2011), 133--142.
[11]
Itti, L., Koch, C., and Niebur, E. A model of saliency-based visual attention for rapid scene analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 11 (1998), 1254--1259.
[12]
Microsoft. Personalize your PC. http://windows.microsoft.com/en-us/windows-8/picture-passwords, last accessed: June 4, 2015.
[13]
Moncur, W., and Leplâtre, G. Pictures at the atm: Exploring the usability of multiple graphical passwords. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '07, ACM (New York, NY, USA, 2007), 887--894.
[14]
Sahami Shirazi, A., Henze, N., Dingler, T., Pielot, M., Weber, D., and Schmidt, A. Large-scale assessment of mobile notifications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '14, ACM (New York, NY, USA, 2014), 3055--3064.
[15]
Schaub, F., Walch, M., Könings, B., and Weber, M. Exploring the design space of graphical passwords on smartphones. In Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, ACM (New York, NY, USA, 2013), 11:1--11:14.
[16]
Schneegass, S., Steimle, F., Bulling, A., Alt, F., and Schmidt, A. Smudgesafe: Geometric image transformations for smudge-resistant user authentication. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14, ACM (New York, NY, USA, 2014), 775--786.
[17]
Suo, X., Zhu, Y., and Owen, G. S. Graphical passwords: A survey. In Proceedings of the 21st Annual Computer Security Applications Conference, ACSAC '05, IEEE Computer Society (Washington, DC, USA, 2005), 463--472.
[18]
Tapellini, D. Smart phone thefts rose to 3.1 million last year. ConsumerReports.org (May 2014). http://www.consumerreports.org/cro/news/2014/04/smartphone-thefts-rose-to-3-1-million-last-year/index.htm, last accessed June 4, 2015.
[19]
Thorpe, J., and van Oorschot, P. C. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07, USENIX Association (Berkeley, CA, USA, 2007), 8:1--8:16.
[20]
von Zezschwitz, E., De Luca, A., Janssen, P., and Hussmann, H. Easy to draw, but hard to trace?: On the observability of grid-based (un)lock patterns. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, ACM (New York, NY, USA, 2015), 2339--2342.
[21]
von Zezschwitz, E., Dunphy, P., and De Luca, A. Patterns in the wild: A field study of the usability of pattern and pin-based authentication on mobile devices. In Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services, MobileHCI '13, ACM (New York, NY, USA, 2013), 261--270.
[22]
Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., and Memon, N. Passpoints: Design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud. 63, 1--2 (July 2005), 102--127.

Cited By

View all
  • (2023)Security and Usability of a Personalized User Authentication Paradigm: Insights from a Longitudinal Study with Three Healthcare OrganizationsACM Transactions on Computing for Healthcare10.1145/35646104:1(1-40)Online publication date: 27-Feb-2023
  • (2022)A Novel Dictionary Generation Methodology for Contextual-Based Password CrackingIEEE Access10.1109/ACCESS.2022.317970110(59178-59188)Online publication date: 2022
  • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
  • Show More Cited By

Index Terms

  1. Graphical Passwords in the Wild: Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobileHCI '15: Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services
      August 2015
      611 pages
      ISBN:9781450336529
      DOI:10.1145/2785830
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 24 August 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Graphical passwords
      2. images
      3. security

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      MobileHCI '15
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 202 of 906 submissions, 22%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)23
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 16 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Security and Usability of a Personalized User Authentication Paradigm: Insights from a Longitudinal Study with Three Healthcare OrganizationsACM Transactions on Computing for Healthcare10.1145/35646104:1(1-40)Online publication date: 27-Feb-2023
      • (2022)A Novel Dictionary Generation Methodology for Contextual-Based Password CrackingIEEE Access10.1109/ACCESS.2022.317970110(59178-59188)Online publication date: 2022
      • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
      • (2021)Remote VR Studies: A Framework for Running Virtual Reality Studies Remotely Via Participant-Owned HMDsACM Transactions on Computer-Human Interaction10.1145/347261728:6(1-36)Online publication date: 15-Nov-2021
      • (2021)A Visual Exploration of Cybersecurity ConceptsProceedings of the 13th Conference on Creativity and Cognition10.1145/3450741.3465252(1-10)Online publication date: 22-Jun-2021
      • (2021)A Comparative Study among Different Computer Vision Algorithms for Assisting Users in Picture Password CompositionAdjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization10.1145/3450614.3464474(357-362)Online publication date: 21-Jun-2021
      • (2021)Eye-GUAna: Higher Gaze-Based Entropy and Increased Password Space in Graphical User Authentication Through GamificationACM Symposium on Eye Tracking Research and Applications10.1145/3448018.3458615(1-7)Online publication date: 25-May-2021
      • (2021)A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of ThingsACM Transactions on Internet Technology10.1145/343354422:2(1-28)Online publication date: 22-Oct-2021
      • (2021)Better, Funner, Stronger: A Gameful Approach to Nudge People into Making Less Predictable Graphical Password ChoicesProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445658(1-17)Online publication date: 6-May-2021
      • (2021)Understanding Insider Attacks in Personalized Picture Password SchemesHuman-Computer Interaction – INTERACT 202110.1007/978-3-030-85610-6_42(722-731)Online publication date: 26-Aug-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media