On predictive models and user-drawn graphical passwords

被引:28
|
作者
Van Oorschot, P. C. [1 ]
Thorpe, Julie [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
security; human factors; graphical passwords; Draw-A-Secret; modeling user choice; graphical dictionary; dictionary attack; memorable passwords; password complexity factors;
D O I
10.1145/1284680.1284685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. This leads us to ask whether other types of passwords (e. g., graphical) are also vulnerable to dictionary attack because of users tending to choose memorable passwords. We suggest a method to predict and model a number of such classes for systems where passwords are created solely from a user's memory. We hypothesize that these classes define weak password subspaces suitable for an attack dictionary. For user-drawn graphical passwords, we apply this method with cognitive studies on visual recall. These cognitive studies motivate us to define a set of password complexity factors (e. g., reflective symmetry and stroke count), which define a set of classes. To better understand the size of these classes and, thus, how weak the password subspaces they define might be, we use the "Draw-A-Secret" (DAS) graphical password scheme of Jermyn et al. [1999] as an example. We analyze the size of these classes for DAS under convenient parameter choices and show that they can be combined to define apparently popular subspaces that have bit sizes ranging from 31 to 41 - a surprisingly small proportion of the full password space (58 bits). Our results quantitatively support suggestions that user-drawn graphical password systems employ measures, such as graphical password rules or guidelines and proactive password checking.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Automatic Registration of User Drawn Graphical Passwords
    Jebriel, Salem
    Poet, Ron
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 172 - 177
  • [2] OBJECT RETRIEVAL BASED ON USER-DRAWN SKETCHES
    Yoon, Sang Min
    Kuijper, Arjan
    [J]. VISAPP 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER VISION THEORY AND APPLICATIONS, VOL 2, 2010, : 292 - 299
  • [3] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [4] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [5] Improving menu interaction for cluttered tabletop setups with user-drawn path menus
    Leithinger, Daniel
    Haller, Michael
    [J]. SECOND ANNUAL IEEE INTERNATIONAL WORKSHOP ON HORIZONTAL INTERACTIVE HUMAN-COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 121 - +
  • [6] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355
  • [7] User-drawn sketch-based 3D object retrievalusing sparse coding
    Sang Min Yoon
    Gang-Joon Yoon
    Tobias Schreck
    [J]. Multimedia Tools and Applications, 2015, 74 : 4707 - 4722
  • [8] User-drawn sketch-based 3D object retrievalusing sparse coding
    Yoon, Sang Min
    Yoon, Gang-Joon
    Schreck, Tobias
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (13) : 4707 - 4722
  • [9] Graphical Passwords - A Discussion
    Kayem, Anne V. D. M.
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 596 - 600
  • [10] Graphical passwords: A survey
    Suo, XY
    Zhu, Y
    Owen, GS
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 419 - 428