User Study, Analysis, and Usable Security of Passwords Based on Digital Objects

被引:21
|
作者
Biddle, Robert [1 ]
Mannan, Mohammad [2 ]
van Oorschot, Paul C. [1 ]
Whalen, Tara [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
[2] Univ Toronto, Elect & Comp Engn Dept, Toronto, ON M5S 3G4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Affective passwords; image-based passwords; password authentication; personal digital objects; usable security;
D O I
10.1109/TIFS.2011.2116781
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Despite all efforts, password schemes intended to deploy or encourage the use of strong passwords have largely failed. As an alternative to enable users to create, maintain, and use high-quality passwords willingly, we propose Object-based Password (ObPwd), leveraging the universe of personal or personally meaningful digital content that many users now own or have access to. ObPwd converts user-selected digital objects to high-entropy text passwords. Memorization of exact passwords is replaced by remembering password objects. We present the design details, variants, and usability and security analysis of ObPwd, and report on the results of a hybrid in-lab/at-home user study on 32 participants. The results suggest the scheme has good usability, with excellent memorability, acceptable login times, and very positive user perception, achieved while providing strong security for the threat context explored. We believe this work lays the foundation for a promising password selection paradigm.
引用
收藏
页码:970 / 979
页数:10
相关论文
共 50 条
  • [41] Research on Ontology-Based Usable User Interface Layout Approach
    Luo, Shengyang
    Wang, Yinglin
    Guo, Jianmei
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 1, 2009, : 234 - 238
  • [42] User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM-Based Study
    Shrestha, Ajay Kumar
    Vassileva, Julita
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 203 - 208
  • [43] Security Analysis of a User Authentication Scheme for IoT-Based Healthcare
    Wang, Shengbao
    Zhou, Xin
    Wen, Kang
    Weng, Bosen
    Zeng, Peng
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 6527 - 6530
  • [44] Security Attack Prediction Based on User Sentiment Analysis of Twitter Data
    Hernandez, Aldo
    Sanchez, Victor
    Sanchez, Gabriel
    Perez, Hector
    Olivares, Jesus
    Toscano, Karina
    Nakano, Mariko
    Martinez, Victor
    PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2016, : 610 - 617
  • [45] Security Analysis on a Timestamp-based Remote User Authentication Scheme
    Tan, Zuowen
    Wang, Jianfeng
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2838 - 2843
  • [46] Digital Holography for Recognition and Security of 3D Objects
    Kumar, Dhirendra
    Nishchal, Naveen K.
    ADVANCES IN OPTICAL SCIENCE AND ENGINEERING, 2017, 194 : 107 - 115
  • [47] An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010: 2011
    Realpe-Munoz, Paulo
    Collazos, Cesar A.
    Hurtado, Julio
    Granollers, Toni
    Velasco-Medina, Jaime
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 65 - 76
  • [48] Seeing beyond visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
    Rahman, Farzana
    Gani, Md Osman
    Ahsan, Golam Mushih Tanimul
    Ahamed, Sheikh Iqbal
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 121 - 129
  • [49] Developing Usable Interface for Internet of Things (IoT) Security Analysis Software
    Hong, Seokjun
    Kim, Youngsun
    Kim, Gerard J.
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 322 - 328
  • [50] Provably secure RSA-based remote user authentication protocol using passwords
    Wang, Ding
    Wang, Ping
    Li, Zeng-Peng
    Ma, Chun-Guang
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2015, 35 (01): : 191 - 204