A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords

被引:0
|
作者
Saadi, Zena Mohammad [1 ]
Sadiq, Ahmed T. [1 ]
Akif, Omar Z. [2 ]
Farhan, Alaa K. [1 ]
机构
[1] Univ Technol Iraq, Comp Sci Dept, Baghdad 10066, Iraq
[2] Univ Baghdad, Coll Educ Pure Sci Ibn Al Haitham, Dept Comp Sci, Baghdad 10066, Iraq
关键词
graphical user authentication; graphical password; possible attacks; security vulnerabilities; countermeasures; SCHEME; MODEL;
D O I
10.3390/electronics13153042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories-randomization, obfuscation, and password space complexity-which are the most commonly employed strategies for improving graphical password schemes.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] Graphical passwords: A survey
    Suo, XY
    Zhu, Y
    Owen, GS
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 419 - 428
  • [2] Balancing Usability and Security of Graphical Passwords
    Lapin, Kristina
    Siurkus, Manfredas
    [J]. DIGITAL INTERACTION AND MACHINE INTELLIGENCE, MIDI 2021, 2022, 440 : 153 - 160
  • [3] Implementation of Graphical Passwords in Internet Banking for Enhanced Security
    Razvi, Salma Abid
    Neelima, S.
    Prathyusha, C.
    Yuvasree, G.
    Ganga, C.
    Kumar, K. Manoj
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 35 - 41
  • [4] GridMap: Enhanced Security in Cued-Recall Graphical Passwords
    Van Balen, Nicolas
    Wang, Haining
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 75 - 94
  • [5] Usability and Security of Gaze-Based Graphical Grid Passwords
    Arianezhad, Majid
    Stebila, Douglas
    Mozaffari, Behzad
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 17 - 33
  • [6] The Impact of Image Choices on the Usability and Security of Click Based Graphical Passwords
    Suo, Xiaoyuan
    Zhu, Ying
    Owen, G. Scott
    [J]. ADVANCES IN VISUAL COMPUTING, PT 2, PROCEEDINGS, 2009, 5876 : 889 - +
  • [7] Graphical Passwords - A Discussion
    Kayem, Anne V. D. M.
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 596 - 600
  • [8] A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
    Por, Lip Yee
    Ng, Ian Ouii
    Chen, Yen-Lin
    Yang, Jing
    Ku, Chin Soon
    [J]. IEEE ACCESS, 2024, 12 : 53408 - 53423
  • [9] Graphical dictionaries and the memorable space of graphical passwords
    Thorpe, J
    van Oorschot, PC
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 135 - 150
  • [10] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)