User Study, Analysis, and Usable Security of Passwords Based on Digital Objects

被引:21
|
作者
Biddle, Robert [1 ]
Mannan, Mohammad [2 ]
van Oorschot, Paul C. [1 ]
Whalen, Tara [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
[2] Univ Toronto, Elect & Comp Engn Dept, Toronto, ON M5S 3G4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Affective passwords; image-based passwords; password authentication; personal digital objects; usable security;
D O I
10.1109/TIFS.2011.2116781
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Despite all efforts, password schemes intended to deploy or encourage the use of strong passwords have largely failed. As an alternative to enable users to create, maintain, and use high-quality passwords willingly, we propose Object-based Password (ObPwd), leveraging the universe of personal or personally meaningful digital content that many users now own or have access to. ObPwd converts user-selected digital objects to high-entropy text passwords. Memorization of exact passwords is replaced by remembering password objects. We present the design details, variants, and usability and security analysis of ObPwd, and report on the results of a hybrid in-lab/at-home user study on 32 participants. The results suggest the scheme has good usability, with excellent memorability, acceptable login times, and very positive user perception, achieved while providing strong security for the threat context explored. We believe this work lays the foundation for a promising password selection paradigm.
引用
收藏
页码:970 / 979
页数:10
相关论文
共 50 条
  • [31] USERS, USER INTERFACES, AND OBJECTS - ENVISION, A DIGITAL LIBRARY
    FOX, EA
    HIX, D
    NOWELL, LT
    BRUENI, DJ
    WAKE, WC
    HEATH, LS
    RAO, D
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1993, 44 (08): : 480 - 491
  • [32] The Impact of Image Choices on the Usability and Security of Click Based Graphical Passwords
    Suo, Xiaoyuan
    Zhu, Ying
    Owen, G. Scott
    ADVANCES IN VISUAL COMPUTING, PT 2, PROCEEDINGS, 2009, 5876 : 889 - +
  • [33] Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines
    Mwagwabi, Florence
    McGill, Tanya
    Dixon, Michael
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 3188 - 3197
  • [34] More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication
    Wiefling, Stephan
    Duermuth, Markus
    Lo Iacono, Luigi
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 203 - 218
  • [35] The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
    Wang, Chun
    Jan, Steve T. K.
    Hu, Hang
    Bossart, Douglas
    Wang, Gang
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 196 - 203
  • [36] User-centric security analysis of MitID: The Danish passwordless digital identity solution
    Kingo, Thomas
    Aranha, Diego F.
    COMPUTERS & SECURITY, 2023, 132
  • [37] Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords
    Stobert, Elizabeth
    Forget, Alain
    Chiasson, Sonia
    van Oorschot, P. C.
    Biddle, Robert
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 79 - 88
  • [38] A Semantic-Driven Model for Ranking Digital Learning Objects Based on Diversity in the User Comments
    Abolkasim, Entisar
    Lau, Lydia
    Dimitrova, Vania
    ADAPTIVE AND ADAPTABLE LEARNING, EC-TEL 2016, 2016, 9891 : 3 - 15
  • [39] A Study of Personal Information in Human-chosen Passwords and Its Security Implications
    Li, Yue
    Wang, Haining
    Sun, Kun
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [40] LEARNING OBJECT REENGINEERING BASED ON PRINCIPLES FOR USABLE USER INTERFACE DESIGN
    Damasevicius, Robertas
    Tankeleviciene, Lina
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL HCI: HUMAN-COMPUTER INTERACTION, 2008, : 124 - +