Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Using Episodic Memory for User Authentication

Published: 02 April 2019 Publication History

Abstract

Passwords are widely used for user authentication, but they are often difficult for a user to recall, easily cracked by automated programs, and heavily reused. Security questions are also used for secondary authentication. They are more memorable than passwords, because the question serves as a hint to the user, but they are very easily guessed. We propose a new authentication mechanism, called “life-experience passwords (LEPs).” Sitting somewhere between passwords and security questions, an LEP consists of several facts about a user-chosen life event—such as a trip, a graduation, a wedding, and so on. At LEP creation, the system extracts these facts from the user’s input and transforms them into questions and answers. At authentication, the system prompts the user with questions and matches the answers with the stored ones. We show that question choice and design make LEPs much more secure than security questions and passwords, while the question-answer format promotes low password reuse and high recall.
Specifically, we find that: (1) LEPs are 109--1014 × stronger than an ideal, randomized, eight-character password; (2) LEPs are up to 3 × more memorable than passwords and on par with security questions; and (3) LEPs are reused half as often as passwords. While both LEPs and security questions use personal experiences for authentication, LEPs use several questions that are closely tailored to each user. This increases LEP security against guessing attacks. In our evaluation, only 0.7% of LEPs were guessed by casual friends, and 9.5% by family members or close friends—roughly half of the security question guessing rate. On the downside, LEPs take around 5 × longer to input than passwords. So, these qualities make LEPs suitable for multi-factor authentication at high-value servers, such as financial or sensitive work servers, where stronger authentication strength is needed.

References

[1]
Lee Averell and Andrew Heathcote. 2011. The form of the forgetting curve and the fate of memories. J. Math. Psychol. 55, 1 (2011), 25--35.
[2]
Anders Björkelund, Love Hafdell, and Pierre Nugues. 2009. Multilingual semantic role labeling. In Proceedings of the 13th Conference on Computational Natural Language Learning: Shared Task. Association for Computational Linguistics, 43--48.
[3]
The GitHub Blog. 2016. GitHub Security Update: Reused password attack. Retrieved from https://github.com/blog/2190-github-security-update-reused-password-attack.
[4]
Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, and Patrick Lincoln. 2012. Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks. In Proceedings of the 21st USENIX Conference on Security Symposium. USENIX Association, 33--33.
[5]
Joseph Bonneau. 2012. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proceedings of the IEEE Symposium on Security and Privacy. Retrieved from http://www.jbonneau.com/doc/B12-IEEESP-analyzing_70M_anonymized_passwords.pdf.
[6]
Joseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, and Mike Williamson. 2015a. Secrets, lies, and account recovery: Lessons from the use of personal knowledge questions at google. In Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 141--150.
[7]
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. 2012. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proceedings of the IEEE Symposium on Security and Privacy. Retrieved from http://www.jbonneau.com/doc/BHOS12-IEEESP-quest_to_replace_passwords.pdf.
[8]
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. 2015b. Passwords and the evolution of imperfect authentication. Commun. ACM (July 2015). Retrieved from http://www.jbonneau.com/doc/BHOS15-CACM-imperfect_authentication.pdf.
[9]
Joseph Bonneau, Mike Just, and Greg Matthews. 2010. What’s in a name? In Financial Cryptography and Data Security. Springer, 98--113.
[10]
N. M. Bradburn, L. J. Rips, and S. K. Shevell. 1987. Answering autobiographical questions: The impact of memory and inference on surveys. Science 236, 4798 (1987).
[11]
Brain Authentication. 2016. http://brainauth.com/testdrive/.
[12]
Claude Castelluccia, Markus Dürmuth, and Daniele Perito. 2012. Adaptive password-strength meters from Markov models. In Proceedings of the Network and Distributed System Security Symposium (NDSS’12).
[13]
Danqi Chen and Christopher D. Manning. 2014. A fast and accurate dependency parser using neural networks. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP’14), Vol. 1. 740--750.
[14]
Cognitive password. 2016. http://en.wikipedia.org/wiki/Cognitive password/.
[15]
Microsoft Corporation. 2015. Sketch-based password authentication. US Patent number 8,024,775.
[16]
Sauvik Das, Eiji Hayashi, and Jason I. Hong. 2013. Exploring capturable everyday memory for autobiographical authentication. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 211--220.
[17]
Darren Davis, Fabian Monrose, and Michael K. Reiter. 2004. On user choice in graphical password schemes. In Proceedings of the USENIX Security Symposium, Vol. 13. 11--11.
[18]
Matteo Dell’Amico and Maurizio Filippone. 2015. Monte Carlo strength evaluation: Fast and reliable password checking. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 158--169.
[19]
Tamara Denning, Kevin Bowers, Marten van Dijk, and Ari Juels. 2011. Exploring implicit memory for painless password recovery. In Proceedings of the Annual Conference on Human Factors in Computing Systems. ACM, 2615--2618.
[20]
Geoff Duncan. 2016. Why haven't biometrics replaced passwords yet? http://www.digitaltrends.com/android/can-biometrics-secure-our-digital-lives/.
[21]
Hermann Ebbinghaus. 1913. Memory: A Contribution to Experimental Psychology. Number 3. University Microfilms.
[22]
Named entity recognition. 2015. Retrieved on October 10, 2014 from https://en.wikipedia.org/wiki/Named-entity_recognition.
[23]
Pluggable Authentication Modules for Linux (PAM). 2015. Retrieved on October 10, 2014 from http://www.linux-pam.org/.
[24]
Freebase. 2016. http://www.freebase.com/.
[25]
Virgil Griffith and Markus Jakobsson. 2005. Messin’ with texas: Deriving mother’s maiden names using public records. In Applied Cryptography and Network Security. Springer, 91--103.
[26]
NIST Electronic Authentication Guideline. 2006. NIST Special Publication 800-63 Version 1.0. 2.
[27]
Ameya Hanamsagar, Simon S. Woo, Chris Kanich, and Jelena Mirkovic. 2018. Leveraging semantic transformation to investigate password habits and their causes. In Proceedings of the Conference on Human Factors in Computing Systems (CHI’18). ACM, 570.
[28]
Alina Hang, Alexandre De Luca, and Heinrich Hussmann. 2015. I know what you did last week! Do you?: Dynamic security questions for fallback authentication on smartphones. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI’15). 1383--1392.
[29]
Michael Heilman and Noah A. Smith. 2010. Good question!Statistical ranking for question generation. In Proceedings of the 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, 609--617.
[30]
Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, and S Raj Rajagopalan. 2015. Surpass: System-initiated user-replaceable passwords. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 170--181.
[31]
Google Inc. 2015. Facial Recognition. U.S. Patent number 8,457,367.
[32]
Google Inc. 2016. 10,000 Most Common English Words. Retrieved October 10, 2015 from https://github.com/first20hours/google-10000-english/.
[33]
Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin. 1999. The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium. Washington DC, 1--14.
[34]
Mike Just and David Aspinall. 2009. Personal choice and challenge questions: A security and usability assessment. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 8.
[35]
Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Julio Lopez. 2012. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proceedings of the IEEE Symposium on Security and Privacy (SP’12). IEEE, 523--537.
[36]
Elizabeth A. Kensinger. 2007. Negative emotion enhances memory accuracy: Behavioral and neuroimaging evidence. Curr. Direct. Psychol. Sci. 16, 4 (2007), 213--218.
[37]
Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, and Stuart Schechter. 2014. Telepathwords: Preventing weak passwords by reading users’ minds. In 23rd USENIX Security Symposium (USENIX Security'14). 591--606.
[38]
Cynthia Kuo, Sasha Romanosky, and Lorrie Faith Cranor. 2006. Human selection of mnemonic phrase-based passwords. In Proceedings of the 2nd Symposium on Usable Privacy and Security. ACM, 67--78.
[39]
LTH Semantic Role Labeler. 2015. Retrieved October 10, 2014 from http://barbar.cs.lth.se:8081/.
[40]
Christopher D. Manning, Mihai Surdeanu, John Bauer, Jenny Finkel, Steven J. Bethard, and David McClosky. 2014. The Stanford CoreNLP natural language processing toolkit. In Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations. 55--60. Retrieved from http://www.aclweb.org/anthology/P/P14/P14-5010
[41]
Luke Mastin. 2016. The Human Memory. Retrieved from http://www.human-memory.net/.
[42]
Nicholas Micallef and Nalin Asanka Gamagedara Arachchilage. 2017. A gamified approach to improve users? Memorability of fall-back authentication. Proceedings of the Symposium on Usable Privacy and Security (SOUPS’17).
[43]
Mnemonic Guard. 2015a. http://www.mneme.co.jp/english/index.html.
[44]
Mnemonic Guard Blog. 2015b. http://mnemonicguard.blogspot.com/.
[45]
A. Niedzwienska. 2003. Distortion of autobiographical memories. Appl. Cogn. Psychol. 17, 1 (2003), 81--91.
[46]
Ann Nosseir, Richard Connor, and M. D. Dunlop. 2005. Internet authentication based on personal history—A feasibility test. In Proceedings of Customer Focused Mobile Services Workshop.
[47]
THE Corpus of Contemporary American English (COCA). 2015. Retrieved October 10, 2014 from http://corpus.byu.edu/coca/.
[48]
Part of-speech tagging. 2015. Retrieved October 10, 2014 from https://en.wikipedia.org/wiki/Part-of-speech_tagging.
[49]
Semantic role labeling. 2015. Retrieved October 10, 2014 from https://en.wikipedia.org/wiki/Semantic_role_labeling.
[50]
Stuart Schechter, A. J. Bernheim Brush, and Serge Egelman. 2009. It’s no secret. Measuring the security and reliability of authentication via ’secret’ questions. In Proceedings of the 30th IEEE Symposium on Security and Privacy. IEEE, 375--390.
[51]
Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2012. Correct horse battery staple: Exploring the usability of system-assigned passphrases. In Proceedings of the 8th Symposium on Usable Privacy and Security. ACM, 7.
[52]
Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip Seyoung Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2014. Can long passwords be secure and usable? In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2927--2936.
[53]
Anil Somayaji, David Mould, and Carson Brown. 2013. Towards narrative authentication: Or, against boring authentication. In Proceedings of the Workshop on New Security Paradigms Workshop. ACM, 57--64.
[54]
Amazon Mechanical Turk. 2018. https://www.mturk.com/.
[55]
Blase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin, Jessica Colnago, Lorrie Cranor, Harold Dixon, Pardis Emami Naeini, Hana Habib, Noah Johnson, and William Melicher. 2017. Design and evaluation of a data-driven password meter. In Proceedings of the 35th Annual ACM Conference on Human Factors in Computing Systems (CHI’17).
[56]
Rafael Veras, Christopher Collins, and Julie Thorpe. 2014. On the semantic patterns of passwords and their security impact. In Proceedings of the Network and Distributed System Security Symposium (NDSS’14).
[57]
Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. 2016. Understanding password choices: How frequently entered passwords are re-used across websites. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS’16).
[58]
Wikipedia, The Free Encyclopedia. 2004. Retrieved on February 12, 2016 from https://en.wikipedia.org/wiki/Main_Page.
[59]
Simon Woo, Elsi Kaiser, Ron Artstein, and Jelena Mirkovic. 2016a. Life-experience passwords (LEPs). In Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM Press, 113--126.
[60]
Simon S. Woo, Zuyao Li, and Jelena Mirkovic. 2016b. Good automatic authentication question generation. In Proceedings of the 9th International Natural Language Generation Conference. 203.
[61]
Simon S. Woo and Jelena Mirkovic. 2016. Improving recall and security of passphrases through use of mnemonics. In Proceedings of the 10th International Conference on Passwords (Passwords).
[62]
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, and Masakatsu Nishigaki. 2008. Improvement of user authentication using schema of visual memory: Exploitation of “schema of story.” In Proceedings of the 22nd International Conference on Advanced Information Networking and Applications (AINA’08). IEEE, 40--47.
[63]
Xuchen Yao, Emma Tosch, Grace Chen, Elnaz Nouri, Ron Artstein, Anton Leuski, Kenji Sagae, and David Traum. 2012. Creating conversational characters using question generation tools. Dialog. Discourse 3, 2 (2012), 125--146.

Cited By

View all
  • (2024)Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at DesksProceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3623509.3633360(1-15)Online publication date: 11-Feb-2024
  • (2023)A framework for analyzing authentication risks in account networksComputers and Security10.1016/j.cose.2023.103515135:COnline publication date: 1-Dec-2023
  • (2022)Enhancing the user authentication process with colour memory cuesBehaviour & Information Technology10.1080/0144929X.2022.209147442:10(1548-1567)Online publication date: 15-Jul-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Privacy and Security
ACM Transactions on Privacy and Security  Volume 22, Issue 2
May 2019
214 pages
ISSN:2471-2566
EISSN:2471-2574
DOI:10.1145/3316298
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2019
Accepted: 01 January 2019
Revised: 01 October 2018
Received: 01 March 2018
Published in TOPS Volume 22, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Authentication
  2. password
  3. security question
  4. template
  5. usability

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Institute for Information 8 communications Technology Promotion (IITP), by NRF of Korea by the MSIT
  • Ministry of Science and ICT (MSIT), Korea, under the ICT Consilience Creative program

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)10
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at DesksProceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3623509.3633360(1-15)Online publication date: 11-Feb-2024
  • (2023)A framework for analyzing authentication risks in account networksComputers and Security10.1016/j.cose.2023.103515135:COnline publication date: 1-Dec-2023
  • (2022)Enhancing the user authentication process with colour memory cuesBehaviour & Information Technology10.1080/0144929X.2022.209147442:10(1548-1567)Online publication date: 15-Jul-2022
  • (2020)A Cross-cultural Perspective for Personalizing Picture PasswordsProceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization10.1145/3340631.3394859(43-52)Online publication date: 7-Jul-2020
  • (2019)Designing for Fallible Humans2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)10.1109/CIC48465.2019.00042(298-305)Online publication date: Dec-2019

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media