Context. Draw a Secret [Usenix 99] Draw a Secret. Do background images improve Draw a Secret graphical passwords?

Similar documents
A look at the impact of aesthetics on human-computer interaction.

Evaluation of Serial Periodic, Multi-Variable Data Visualizations

Introduction It is now widely recognised that metonymy plays a crucial role in language, and may even be more fundamental to human speech and cognitio

The Effects of Web Site Aesthetics and Shopping Task on Consumer Online Purchasing Behavior

Approaching Aesthetics on User Interface and Interaction Design

Simulated killing. Michael Lacewing

Vuzik: Music Visualization and Creation on an Interactive Surface

Enhancing Music Maps

Facetop on the Tablet PC: Assistive technology in support of classroom notetaking for hearing impaired students

Mallrats: Mirror Image. kathryn chinn tania choi jessica cohen john wong

3/26/2013. Midterm. Anna Loparev Intro HCI 03/21/2013. Emotional interaction. (Ch 1, 10) Usability Goals

Manual for what? What move a brand? She is moved by TRUST AND VALUES OF PERCEPTION BY YOUR CONSUMERS.

IZA World of Labor: Author guidelines

6 th Grade Summer Reading Assignment

Critical Analytical Response to Literature: Paragraph Writing Structure

Copyright 2008 Society of Manufacturing Engineers. FUNDAMENTALS OF TOOL DESIGN Progressive Die Design

Welcome to Interface Aesthetics 2008! Interface Aesthetics 01/28/08

Supplemental results from a Garden To Café scannable taste test survey for snack fruit administered in classrooms at PSABX on 12/14/2017

A Brief Guide to Writing SOCIAL THEORY

Name: Date: Baker ELA 9

Cryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian

Retrospective Statements of OUV for World Heritage Properties: Authenticity & Integrity

Music Performance Panel: NICI / MMM Position Statement

COLORSCAN. Technical and economical proposal for. DECOSYSTEM / OFF.A419.Rev00 1 of 8. DECOSYSTEM /OFF A419/09 Rev November 2009

Additional media information United States & United Kingdom

articles 1

7. For example in relation to Northern Ireland,

An Example of Eliminating a Technical Problem with Only One Single Part

Noise. CHEM 411L Instrumental Analysis Laboratory Revision 2.0

INTRODUCING AUDIO D-TOUCH: A TANGIBLE USER INTERFACE FOR MUSIC COMPOSITION AND PERFORMANCE

STAT 113: Statistics and Society Ellen Gundlach, Purdue University. (Chapters refer to Moore and Notz, Statistics: Concepts and Controversies, 8e)

THE SONIC ENHANCEMENT OF GRAPHICAL BUTTONS

Author Directions: Navigating your success from PhD to Book

PARAGRAPHS ON DECEPTUAL ART by Joe Scanlan

Wilson, Tony: Understanding Media Users: From Theory to Practice. Wiley-Blackwell (2009). ISBN , pp. 219

IC Mask Design. Christopher Saint Judy Saint

Analyzing an Argument:! Clai The Global Writing Block Pavi ms & Evidenc

Standardization of Field Performance Measurement Methods for Product Acceptance

CHILDREN S CONCEPTUALISATION OF MUSIC

Argumentation and persuasion

Module A Experience through Language

Which Channel Is That On? A Design Model for Electronic Programme Guides.

Entrance Hall Exhibition

CHAPTER 5 FINDINGS, SUGGESTIONS AND CONCLUSIONS

Quantify. The Subjective. PQM: A New Quantitative Tool for Evaluating Display Design Options

The software concept. Try yourself and experience how your processes are significantly simplified. You need. weqube.

Mixture of styles in feedback reduces clarity of message to contestants Doesn t look joined up or coherent Doesn t present a professional image

Unit 2. WoK 1 - Perception

A Functional Representation of Fuzzy Preferences

Activity 1: Discovering Elements of Poetry

Reply to Stalnaker. Timothy Williamson. In Models and Reality, Robert Stalnaker responds to the tensions discerned in Modal Logic

IOT TECHNOLOGY AND ITS IMPACT

DICOM Correction Item

London Environment Directors Network

National Coalition for Core Arts Standards. Music Model Cornerstone Assessment: General Music Grades 3-5

Usability of Computer Music Interfaces for Simulation of Alternate Musical Systems

Improving music composition through peer feedback: experiment and preliminary results

Information-not-thing: further problems with and alternatives to the belief that information is physical

BBC Trust Changes to HD channels Assessment of significance

End users' perceptions concerning computer applications implemented in broadcast stations

Grid Code Modification Register. March 2018

Joint Safety and Security Analysis for Complex Systems. Sergey Bezzateev, Natalia Voloshina, Petr Sankin

invite writing party party friend birthday party invite birthday writing party

Australian Broadcasting Corporation Submission Digital Conversion of Self-Help Television Retransmission Sites

Understanding Compression Technologies for HD and Megapixel Surveillance

Quine s Two Dogmas of Empiricism. By Spencer Livingstone

6-Point Rubrics. for Books A H

AP Statistics Sec 5.1: An Exercise in Sampling: The Corn Field

Adding Analog and Mixed Signal Concerns to a Digital VLSI Course

100Gb/s Single-lane SERDES Discussion. Phil Sun, Credo Semiconductor IEEE New Ethernet Applications Ad Hoc May 24, 2017

The Human Intellect: Aristotle s Conception of Νοῦς in his De Anima. Caleb Cohoe

Connected Broadcasting

Rules of Convergence What would become the face of the Internet TV?

ENGR 40M Project 3b: Programming the LED cube

Appalachian Center for Craft - Clay Studio. How to Write an Artist s Statement

Usage metrics: tools for evaluating science collections

SIP Project Report Format

StepSequencer64 J74 Page 1. J74 StepSequencer64. A tool for creative sequence programming in Ableton Live. User Manual

Metaphors we live by. Structural metaphors. Orientational metaphors. A personal summary

BBC to put programs online

Highlights of Findings San Antonio Aesthetic Development and Creative and Critical Thinking Skills Study Karin DeSantis and Abigail Housen

Authenticity and Appraisal: Appraisal Theory Confronted With Electronic Records

Electronic Records in Maine. Presented by Nina M. Osier, Director Division of Records Management Services Maine State Archives May 20, 2008

David CARSON Contemporary International - Deconstructivism

Content. Learning Outcomes. In this lesson you will learn all about antonyms.

PROPER PLAYING AREA. Instantly Improve the Sound of Your Percussion Section

How is Wit Defined and Portrayed in Aphra Behn s The Rover? C.S. Lewis believed Rational creatures are those to whom God has given wit (qtd.

STEPS. For Successful Content Design In Digital Signage Systems

GEOMETRY OF DESIGN: STUDIES IN PROPORTION AND COMPOSITION BY KIMBERLY ELAM

Proposal: Problems and Directions in Metadata for Digital Audio Libraries

Satire Project Outline

The Environment and Organizational Effort in an Ensemble

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

Hybrid resampling methods for confidence intervals: comment

Remember is composed in the form known as the Italian or Petrarchan sonnet, rhymed abba abba cdd ece, traditionally associated with love poetry.

N E W S L E T T E R 4 1 JUL 15. July 2015 How would we feel if Aliens took over our Lives? Page 1 Your Step to Reconciliation Roseline Deleu Page 5

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! VCE_SAR_Annotation_Kinnersley_2013. VCE Studio Arts! Unit 3! Annotation

Making Progress With Sounds - The Design & Evaluation Of An Audio Progress Bar

Volume, pace, clarity and expression are appropriate. Tone of voice occasionally engages the audience

Getting started with. A webinar from. thinksmartbox.com/smart-support

Transcription:

Do background images improve Draw a Secret graphical passwords? Jeff Yan School of Computing Science Newcastle University, UK (Joint work with Paul Dunphy) Context Textual passwords Cheap, convenient, ubiquitous Have long suffered usability problems Due to limitations of human memory Graphical passwords A picture is worth a thousand words Hot topic in both security and HCI communities Bonder ( 96), Passfaces, Inkblot, Passpoints, etc. Collective understanding: still in its infancy ACM CCS 07, Oct 30 (2) Draw a Secret [Usenix 99] Draw a Secret One representative scheme; one of the few supporting both Authentication: to verify the claimed identify of a user, and Key generation: to use a password to generate a long crypto key Theoretical password space: DAS > textual A password is a free-form drawing on a grid of size N N Sample: encoded as (2, 2), (3,2), (3,3), (2,3), (2,2), (2,1), (5,5), (1,2), (1,3), (5,5) Two secrets are the same if the encoding is the same; Determinants of password strength include Stroke count (2) Password length (8) Grid size (4x4) ACM CCS 07, Oct 30 (3) ACM CCS 07, Oct 30 (4)

Problems with DAS Users tend to pick weak passwords that are vulnerable to graphical dictionary attack (Thorpe and van Oorschot [usenix 04]) Small stroke count, Small password length, Mirror symmetry Implication: this theoretically sound scheme is less secure in practice 1-week recall (pilot): avg strength of memorable passwords < 41.9 bits (vs. 8-character text pwd: 53 bits) Grid selection as a solution Thorpe and van Oorschot [acsac04] How it works: Adds up to 16 bits to the password space Unclear it works well as expected (no empirical study yet) ACM CCS 07, Oct 30 (5) ACM CCS 07, Oct 30 (6) Intuition behind our solution In DAS, difficult to reconstruct a complex secret E.g. people were able to remember what their drawings looked like, but failed to replicate them in the correct location (Goldberg et al [CHI 02]) The cells in the grid all look alike! What if recreation of a secret can be aided by something that reduces the confusion, e.g. a background image? Our novel proposal Background Draw a Secret (BDAS): Instead of creating a secret on an empty grid, a user choose a background image to be overlaid by the grid, and then create a secret as in DAS DAS BDAS ACM CCS 07, Oct 30 (7) ACM CCS 07, Oct 30 (8)

Empirical evaluations Design Paper/transparency prototype Drawing grid 5x5 Same size as a popular PDA Comparative study DAS: grid printed on transparency BDAS: choose one out of 5 images to be overlaid with grid Procedure 46 participants 26: non-technical 32 M, 14 F Age: 18-25 (one 50+) Briefing & randomly assigned a group Practice Password creation 5-minute recall 1-week recall What background image to choose? Little guideline in literature have meaningful content and rich details (Wiedenbeck et al SOUPS 05) Easy to select spots Intuition Not introduce obvious bias Everyday images ACM CCS 07, Oct 30 (9) ACM CCS 07, Oct 30 (10) Background images used Stars Map Plant Crowds Playing card Lowdetail Results: background image choice Images dense with content (map and crowd) anticipated to be the most popular This was clearly contradicted Playing card: 33% of selections, plant: 30% ACM CCS 07, Oct 30 (11) ACM CCS 07, Oct 30 (12)

Results: password quality Complexity of secrets in each group password length BDAS: stronger by more than 10 bits Results: 5-minute recall Recall rate DAS: 100% (23/23); BDAS: 96% (22/23) [Fig10(a)] Complexity of successfully recalled secrets: Symmetry: 43% (BDAS) vs 57% (DAS) Centering within the grid: 43% (BDAS) vs. 87% (DAS) password length; avg strength: larger by more than 10 bits BDAS: less symmetry and centering ACM CCS 07, Oct 30 (13) ACM CCS 07, Oct 30 (14) Results: 1-week recall Recall rate DAS = BDAS = 95% (20/21) Complexity of successfully recalled secrets: Summary A simple idea: introducing background images into DAS Nice results Much stronger passwords; just as memorable as their much simpler DAS counterparts. The most exciting bit: A simple idea significantly enhances both usability and security simultaneously Numerous possibilities for future study password length Avg strength: <60 bits (DAS); >70.2 bits (BDAS) BDAS: less symmetry and centering ACM CCS 07, Oct 30 (15) ACM CCS 07, Oct 30 (16)

Ongoing and future work Larger scale of experiments with an actual implementation DAS vs. BDAS BDAS vs. textual passwords What will make good background images? Effect of individual background image choices Shoulder surfing resistance Interference between multiple passwords Many more Thank You! Jeff.Yan@ncl.ac.uk ACM CCS 07, Oct 30 (17)