首页 > 最新文献

Symposium On Usable Privacy and Security最新文献

英文 中文
Usability of CAPTCHAs or usability issues in CAPTCHA design 验证码的可用性或验证码设计中的可用性问题
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408671
Jeff Yan, A. E. Ahmad
CAPTCHA is now almost a standard security technology, and has found widespread application in commercial websites. Usability and robustness are two fundamental issues with CAPTCHA, and they often interconnect with each other. This paper discusses usability issues that should be considered and addressed in the design of CAPTCHAs. Some of these issues are intuitive, but some others have subtle implications for robustness (or security). A simple but novel framework for examining CAPTCHA usability is also proposed.
CAPTCHA现在几乎是一种标准的安全技术,并在商业网站上得到了广泛的应用。可用性和健壮性是CAPTCHA的两个基本问题,它们经常相互关联。本文讨论了在设计验证码时应该考虑和解决的可用性问题。其中一些问题是直观的,但其他一些问题对健壮性(或安全性)有微妙的影响。本文还提出了一个简单而新颖的验证码可用性检验框架。
{"title":"Usability of CAPTCHAs or usability issues in CAPTCHA design","authors":"Jeff Yan, A. E. Ahmad","doi":"10.1145/1408664.1408671","DOIUrl":"https://doi.org/10.1145/1408664.1408671","url":null,"abstract":"CAPTCHA is now almost a standard security technology, and has found widespread application in commercial websites. Usability and robustness are two fundamental issues with CAPTCHA, and they often interconnect with each other. This paper discusses usability issues that should be considered and addressed in the design of CAPTCHAs. Some of these issues are intuitive, but some others have subtle implications for robustness (or security). A simple but novel framework for examining CAPTCHA usability is also proposed.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126270604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 342
The challenges of using an intrusion detection system: is it worth the effort? 使用入侵检测系统的挑战:值得付出努力吗?
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408679
R. Werlinger, K. Hawkey, Kasia Muldner, P. Jaferian, K. Beznosov
An intrusion detection system (IDS) can be a key component of security incident response within organizations. Traditionally, intrusion detection research has focused on improving the accuracy of IDSs, but recent work has recognized the need to support the security practitioners who receive the IDS alarms and investigate suspected incidents. To examine the challenges associated with deploying and maintaining an IDS, we analyzed 9 interviews with IT security practitioners who have worked with IDSs and performed participatory observations in an organization deploying a network IDS. We had three main research questions: (1) What do security practitioners expect from an IDS?; (2) What difficulties do they encounter when installing and configuring an IDS?; and (3) How can the usability of an IDS be improved? Our analysis reveals both positive and negative perceptions that security practitioners have for IDSs, as well as several issues encountered during the initial stages of IDS deployment. In particular, practitioners found it difficult to decide where to place the IDS and how to best configure it for use within a distributed environment with multiple stakeholders. We provide recommendations for tool support to help mitigate these challenges and reduce the effort of introducing an IDS within an organization.
入侵检测系统(IDS)可以成为组织内安全事件响应的关键组件。传统上,入侵检测研究的重点是提高IDS的准确性,但最近的工作已经认识到需要支持接收IDS警报和调查可疑事件的安全从业人员。为了研究与部署和维护IDS相关的挑战,我们分析了与IT安全从业人员的9个访谈,这些从业人员使用过IDS,并在部署网络IDS的组织中进行了参与性观察。我们有三个主要的研究问题:(1)安全从业者对入侵检测系统的期望是什么?(2)在安装和配置IDS时遇到哪些困难?(3)如何提高IDS的可用性?我们的分析揭示了安全从业者对入侵防御系统的积极和消极看法,以及在入侵防御系统部署的初始阶段遇到的几个问题。特别是,从业者发现很难决定将IDS放置在哪里,以及如何最好地配置它,以便在具有多个涉众的分布式环境中使用。我们为工具支持提供建议,以帮助缓解这些挑战,并减少在组织中引入IDS的工作量。
{"title":"The challenges of using an intrusion detection system: is it worth the effort?","authors":"R. Werlinger, K. Hawkey, Kasia Muldner, P. Jaferian, K. Beznosov","doi":"10.1145/1408664.1408679","DOIUrl":"https://doi.org/10.1145/1408664.1408679","url":null,"abstract":"An intrusion detection system (IDS) can be a key component of security incident response within organizations. Traditionally, intrusion detection research has focused on improving the accuracy of IDSs, but recent work has recognized the need to support the security practitioners who receive the IDS alarms and investigate suspected incidents. To examine the challenges associated with deploying and maintaining an IDS, we analyzed 9 interviews with IT security practitioners who have worked with IDSs and performed participatory observations in an organization deploying a network IDS. We had three main research questions: (1) What do security practitioners expect from an IDS?; (2) What difficulties do they encounter when installing and configuring an IDS?; and (3) How can the usability of an IDS be improved? Our analysis reveals both positive and negative perceptions that security practitioners have for IDSs, as well as several issues encountered during the initial stages of IDS deployment. In particular, practitioners found it difficult to decide where to place the IDS and how to best configure it for use within a distributed environment with multiple stakeholders. We provide recommendations for tool support to help mitigate these challenges and reduce the effort of introducing an IDS within an organization.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126654981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Analyzing websites for user-visible security design flaws 分析网站用户可见的安全设计缺陷
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408680
L. Falk, A. Prakash, Kevin Borders
An increasing number of people rely on secure websites to carry out their daily business. A survey conducted by Pew Internet states 42% of all internet users bank online. Considering the types of secure transactions being conducted, businesses are rigorously testing their sites for security flaws. In spite of this testing, some design flaws still remain that prevent secure usage. In this paper, we examine the prevalence of user-visible security design flaws by looking at sites from 214 U.S. financial institutions. We specifically chose financial websites because of their high security requirements. We found a number of flaws that may lead users to make bad security decisions, even if they are knowledgeable about security and exhibit proper browser use consistent with the site's security policies. To our surprise, these design flaws were widespread. We found that 76% of the sites in our survey suffered from at least one design flaw. This indicates that these flaws are not widely understood, even by experts who are responsible for web security. Finally, we present our methodology for testing websites and discuss how it can help systematically discover user-visible security design flaws.
越来越多的人依靠安全的网站来开展日常业务。皮尤互联网公司进行的一项调查显示,42%的互联网用户在网上银行。考虑到正在进行的安全交易的类型,企业正在严格测试其站点的安全漏洞。尽管进行了这些测试,一些设计缺陷仍然存在,妨碍了安全使用。在本文中,我们通过查看214家美国金融机构的网站来检查用户可见的安全设计缺陷的普遍性。我们特别选择了金融类网站,因为它们的安全性要求很高。我们发现了许多可能导致用户做出错误安全决策的缺陷,即使他们了解安全知识并按照站点的安全策略正确使用浏览器。令我们惊讶的是,这些设计缺陷普遍存在。我们发现,在我们的调查中,76%的网站至少存在一个设计缺陷。这表明这些漏洞并没有被广泛理解,即使是负责网络安全的专家。最后,我们提出了测试网站的方法,并讨论了它如何帮助系统地发现用户可见的安全设计缺陷。
{"title":"Analyzing websites for user-visible security design flaws","authors":"L. Falk, A. Prakash, Kevin Borders","doi":"10.1145/1408664.1408680","DOIUrl":"https://doi.org/10.1145/1408664.1408680","url":null,"abstract":"An increasing number of people rely on secure websites to carry out their daily business. A survey conducted by Pew Internet states 42% of all internet users bank online. Considering the types of secure transactions being conducted, businesses are rigorously testing their sites for security flaws. In spite of this testing, some design flaws still remain that prevent secure usage. In this paper, we examine the prevalence of user-visible security design flaws by looking at sites from 214 U.S. financial institutions. We specifically chose financial websites because of their high security requirements. We found a number of flaws that may lead users to make bad security decisions, even if they are knowledgeable about security and exhibit proper browser use consistent with the site's security policies. To our surprise, these design flaws were widespread. We found that 76% of the sites in our survey suffered from at least one design flaw. This indicates that these flaws are not widely understood, even by experts who are responsible for web security. Finally, we present our methodology for testing websites and discuss how it can help systematically discover user-visible security design flaws.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134415616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Securing passfaces for description 为描述保护通道
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408668
Paul Dunphy, James Nicholson, P. Olivier
One common practice in relation to alphanumeric passwords is to write them down or share them with a trusted friend or colleague. Graphical password schemes often claim the advantage that they are significantly more secure with respect to both verbal disclosure and writing down. We investigated the reality of this claim in relation to the Passfaces graphical password scheme. By collecting a corpus of naturalistic descriptions of a set of 45 faces, we explored participants' ability to associate descriptions with faces across three conditions in which the decoy faces were selected: (1) at random; (2) on the basis of their visual similarity to the target face; and (3) on the basis of the similarity of the verbal descriptions of the decoy faces to the target face. Participants were found to perform significantly worse when presented with visual and verbally grouped decoys, suggesting that Passfaces can be further secured for description. Subtle differences in both the nature of male and female descriptions, and male and female performance were also observed.
对于字母数字密码,一种常见的做法是把它们写下来,或者与信任的朋友或同事分享。图形密码方案通常声称其优势在于它们在口头披露和书面记录方面都更加安全。我们调查了与Passfaces图形密码方案相关的这种说法的真实性。通过收集一组45张面孔的自然描述语料库,我们探索了参与者在三种条件下将描述与面孔联系起来的能力,这些条件是:(1)随机选择;(2)基于与目标人脸的视觉相似性;(3)基于诱饵面部的言语描述与目标面部的相似性。研究发现,当呈现视觉和口头分组诱饵时,参与者的表现明显更差,这表明Passfaces可以进一步用于描述。在男性和女性描述的性质以及男性和女性的表现上也观察到细微的差异。
{"title":"Securing passfaces for description","authors":"Paul Dunphy, James Nicholson, P. Olivier","doi":"10.1145/1408664.1408668","DOIUrl":"https://doi.org/10.1145/1408664.1408668","url":null,"abstract":"One common practice in relation to alphanumeric passwords is to write them down or share them with a trusted friend or colleague. Graphical password schemes often claim the advantage that they are significantly more secure with respect to both verbal disclosure and writing down. We investigated the reality of this claim in relation to the Passfaces graphical password scheme. By collecting a corpus of naturalistic descriptions of a set of 45 faces, we explored participants' ability to associate descriptions with faces across three conditions in which the decoy faces were selected: (1) at random; (2) on the basis of their visual similarity to the target face; and (3) on the basis of the similarity of the verbal descriptions of the decoy faces to the target face. Participants were found to perform significantly worse when presented with visual and verbally grouped decoys, suggesting that Passfaces can be further secured for description. Subtle differences in both the nature of male and female descriptions, and male and female performance were also observed.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130399768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Personal knowledge questions for fallback authentication: security questions in the era of Facebook 备用认证的个人知识问题:Facebook时代的安全问题
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408667
A. Rabkin
Security questions (or challenge questions) are commonly used to authenticate users who have lost their passwords. We examined the password retrieval mechanisms for a number of personal banking websites, and found that many of them rely in part on security questions with serious usability and security weaknesses. We discuss patterns in the security questions we observed. We argue that today's personal security questions owe their strength to the hardness of an information-retrieval problem. However, as personal information becomes ubiquitously available online, the hardness of this problem, and security provided by such questions, will likely diminish over time. We supplement our survey of bank security questions with a small user study that supplies some context for how such questions are used in practice.
安全问题(或质疑问题)通常用于验证丢失密码的用户。我们检查了一些个人银行网站的密码检索机制,发现其中许多部分依赖于具有严重可用性和安全弱点的安全问题。我们在观察到的安全问题中讨论模式。我们认为,今天的个人安全问题的强度归功于信息检索问题的硬度。然而,随着个人信息在网上变得无处不在,这个问题的难度,以及此类问题提供的安全性,可能会随着时间的推移而降低。我们用一个小的用户研究来补充我们对银行安全问题的调查,该研究为如何在实践中使用此类问题提供了一些背景。
{"title":"Personal knowledge questions for fallback authentication: security questions in the era of Facebook","authors":"A. Rabkin","doi":"10.1145/1408664.1408667","DOIUrl":"https://doi.org/10.1145/1408664.1408667","url":null,"abstract":"Security questions (or challenge questions) are commonly used to authenticate users who have lost their passwords. We examined the password retrieval mechanisms for a number of personal banking websites, and found that many of them rely in part on security questions with serious usability and security weaknesses. We discuss patterns in the security questions we observed. We argue that today's personal security questions owe their strength to the hardness of an information-retrieval problem. However, as personal information becomes ubiquitously available online, the hardness of this problem, and security provided by such questions, will likely diminish over time. We supplement our survey of bank security questions with a small user study that supplies some context for how such questions are used in practice.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 220
A user study of off-the-record messaging 非正式消息的用户研究
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408678
R. Stedman, Kayo Yoshida, I. Goldberg
Instant messaging is a prevalent form of communication across the Internet, yet most instant messaging services provide little security against eavesdroppers or impersonators. There are a variety of existing systems that aim to solve this problem, but the one that provides the highest level of privacy is Off-the-Record Messaging (OTR), which aims to give instant messaging conversations the level of privacy available in a face-to-face conversation. In the most recent redesign of OTR, as well as increasing the security of the protocol, one of the goals of the designers was to make OTR easier to use, without users needing to understand details of computer security such as keys or fingerprints. To determine if this design goal has been met, we conducted a user study of the OTR plugin for the Pidgin instant messaging client using the think aloud method. As a result of this study we have identified a variety of usability flaws remaining in the design of OTR. These flaws that we have discovered have the ability to cause confusion, make the program unusable, and even decrease the level of security to users of OTR. We discuss how these errors can be repaired, as well as identify an area that requires further research to improve its usability.
即时消息传递是Internet上流行的一种通信形式,但是大多数即时消息传递服务提供的针对窃听者或模仿者的安全性很低。有各种各样的现有系统旨在解决这个问题,但提供最高级别隐私的是非记录消息(OTR),其目的是为即时消息会话提供面对面对话中可用的隐私级别。在最近对OTR的重新设计中,以及增加协议的安全性,设计者的目标之一是使OTR更易于使用,而不需要用户了解诸如密钥或指纹之类的计算机安全细节。为了确定这个设计目标是否已经实现,我们使用think aloud方法对Pidgin即时消息客户机的OTR插件进行了用户研究。作为这项研究的结果,我们已经确定了OTR设计中仍然存在的各种可用性缺陷。我们发现的这些缺陷有可能导致混乱,使程序无法使用,甚至降低OTR用户的安全级别。我们讨论了如何修复这些错误,并确定了需要进一步研究以提高其可用性的领域。
{"title":"A user study of off-the-record messaging","authors":"R. Stedman, Kayo Yoshida, I. Goldberg","doi":"10.1145/1408664.1408678","DOIUrl":"https://doi.org/10.1145/1408664.1408678","url":null,"abstract":"Instant messaging is a prevalent form of communication across the Internet, yet most instant messaging services provide little security against eavesdroppers or impersonators. There are a variety of existing systems that aim to solve this problem, but the one that provides the highest level of privacy is Off-the-Record Messaging (OTR), which aims to give instant messaging conversations the level of privacy available in a face-to-face conversation. In the most recent redesign of OTR, as well as increasing the security of the protocol, one of the goals of the designers was to make OTR easier to use, without users needing to understand details of computer security such as keys or fingerprints.\u0000 To determine if this design goal has been met, we conducted a user study of the OTR plugin for the Pidgin instant messaging client using the think aloud method. As a result of this study we have identified a variety of usability flaws remaining in the design of OTR. These flaws that we have discovered have the ability to cause confusion, make the program unusable, and even decrease the level of security to users of OTR. We discuss how these errors can be repaired, as well as identify an area that requires further research to improve its usability.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132338074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Use Your Illusion: secure authentication usable anywhere 使用您的幻觉:安全认证可在任何地方使用
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408670
Eiji Hayashi, Rachna Dhamija, Nicolas Christin, A. Perrig
In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure and usable regardless of the size of the device on which it is used. Our system relies on the human ability to recognize a degraded version of a previously seen image. We illustrate how distorted images can be used to maintain the usability of graphical password schemes while making them more resilient to social engineering or observation attacks. Because it is difficult to mentally "revert" a degraded image, without knowledge of the original image, our scheme provides a strong line of defense against impostor access, while preserving the desirable memorability properties of graphical password schemes. Using low-fidelity tests to aid in the design, we implement prototypes of Use Your Illusion as i) an Ajax-based web service and ii) on Nokia N70 cellular phones. We conduct a between-subjects usability study of the cellular phone prototype with a total of 99 participants in two experiments. We demonstrate that, regardless of their age or gender, users are very skilled at recognizing degraded versions of self-chosen images, even on small displays and after time periods of one month. Our results indicate that graphical passwords with distorted images can achieve equivalent error rates to those using traditional images, but only when the original image is known.
在本文中,我们提出并评估了Use Your Illusion,这是一种新的用户身份验证机制,无论使用它的设备大小如何,它都是安全和可用的。我们的系统依赖于人类识别先前看到的图像的降级版本的能力。我们说明了如何使用扭曲的图像来保持图形密码方案的可用性,同时使它们对社会工程或观察攻击更具弹性。由于在不了解原始图像的情况下,很难在心理上“恢复”降级的图像,因此我们的方案提供了一个强大的防御冒名顶替者访问的防线,同时保留了图形密码方案所需的可记忆性。使用低保真度测试来辅助设计,我们将Use Your Illusion的原型实现为i)基于ajax的web服务和ii)在Nokia N70手机上。我们对手机原型进行了受试者间可用性研究,共有99人参与了两个实验。我们证明,无论他们的年龄或性别,用户都非常擅长识别自己选择的图像的降级版本,即使是在小显示器上和一个月后。我们的研究结果表明,具有扭曲图像的图形密码可以达到与使用传统图像的密码相同的错误率,但只有在原始图像已知的情况下。
{"title":"Use Your Illusion: secure authentication usable anywhere","authors":"Eiji Hayashi, Rachna Dhamija, Nicolas Christin, A. Perrig","doi":"10.1145/1408664.1408670","DOIUrl":"https://doi.org/10.1145/1408664.1408670","url":null,"abstract":"In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure and usable regardless of the size of the device on which it is used. Our system relies on the human ability to recognize a degraded version of a previously seen image. We illustrate how distorted images can be used to maintain the usability of graphical password schemes while making them more resilient to social engineering or observation attacks. Because it is difficult to mentally \"revert\" a degraded image, without knowledge of the original image, our scheme provides a strong line of defense against impostor access, while preserving the desirable memorability properties of graphical password schemes.\u0000 Using low-fidelity tests to aid in the design, we implement prototypes of Use Your Illusion as i) an Ajax-based web service and ii) on Nokia N70 cellular phones. We conduct a between-subjects usability study of the cellular phone prototype with a total of 99 participants in two experiments. We demonstrate that, regardless of their age or gender, users are very skilled at recognizing degraded versions of self-chosen images, even on small displays and after time periods of one month. Our results indicate that graphical passwords with distorted images can achieve equivalent error rates to those using traditional images, but only when the original image is known.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116721601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 161
A second look at the usability of click-based graphical passwords 再看一下基于点击的图形密码的可用性
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280682
S. Chiasson, R. Biddle, P. V. Oorschot
Click-based graphical passwords, which involve clicking a set of user-selected points, have been proposed as a usable alternative to text passwords. We conducted two user studies: an initial lab study to revisit these usability claims, explore for the first time the impact on usability of a wide-range of images, and gather information about the points selected by users; and a large-scale field study to examine how click-based graphical passwords work in practice. No such prior field studies have been reported in the literature. We found significant differences in the usability results of the two studies, providing empirical evidence that relying solely on lab studies for security interfaces can be problematic. We also present a first look at whether interference from having multiple graphical passwords affects usability and whether more memorable passwords are necessarily weaker in terms of security.
基于点击的图形密码,包括点击一组用户选择的点,已经被提议作为文本密码的可用替代方案。我们进行了两项用户研究:一项是初步的实验室研究,重新审视这些可用性声明,首次探索大范围图像对可用性的影响,并收集用户选择的点的信息;以及一项大规模的实地研究,以检验基于点击的图形密码在实践中是如何工作的。文献中尚未报道此类先前的实地研究。我们发现两项研究的可用性结果存在显著差异,这提供了经验证据,表明仅依靠实验室研究安全接口可能存在问题。我们还首先介绍了具有多个图形密码的干扰是否会影响可用性,以及更容易记住的密码是否一定在安全性方面较弱。
{"title":"A second look at the usability of click-based graphical passwords","authors":"S. Chiasson, R. Biddle, P. V. Oorschot","doi":"10.1145/1280680.1280682","DOIUrl":"https://doi.org/10.1145/1280680.1280682","url":null,"abstract":"Click-based graphical passwords, which involve clicking a set of user-selected points, have been proposed as a usable alternative to text passwords. We conducted two user studies: an initial lab study to revisit these usability claims, explore for the first time the impact on usability of a wide-range of images, and gather information about the points selected by users; and a large-scale field study to examine how click-based graphical passwords work in practice. No such prior field studies have been reported in the literature. We found significant differences in the usability results of the two studies, providing empirical evidence that relying solely on lab studies for security interfaces can be problematic. We also present a first look at whether interference from having multiple graphical passwords affects usability and whether more memorable passwords are necessarily weaker in terms of security.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123049218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 232
Improving security decisions with polymorphic and audited dialogs 使用多态和审计对话改进安全决策
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280691
J. Brustoloni, Ricardo Villamarín-Salomón
Context-sensitive guidance (CSG) can help users make better security decisions. Applications with CSG ask the user to provide relevant context information. Based on such information, these applications then decide or suggest an appropriate course of action. However, users often deem security dialogs irrelevant to the tasks they are performing and try to evade them. This paper contributes two new techniques for hardening CSG against automatic and false user answers. Polymorphic dialogs continuously change the form of required user inputs and intentionally delay the latter, forcing users to pay attention to security decisions. Audited dialogs thwart false user answers by (1) warning users that their answers will be forwarded to auditors, and (2) allowing auditors to quarantine users who provide unjustified answers. We implemented CSG against email-borne viruses on the Thunderbird email agent. One version, CSG-PD, includes CSG and polymorphic dialogs. Another version, CSG-PAD, includes CSG and both polymorphic and audited dialogs. In user studies, we found that untrained users accept significantly less unjustified risks with CSG-PD than with conventional dialogs. Moreover, they accept significantly less unjustified risks with CSG-PAD than with CSG-PD. CSG-PD and CSG-PAD have insignificant effect on acceptance of justified risks.
上下文敏感指导(CSG)可以帮助用户做出更好的安全决策。带有CSG的应用程序要求用户提供相关的上下文信息。基于这些信息,这些应用程序然后决定或建议一个适当的行动方案。然而,用户经常认为安全对话框与他们正在执行的任务无关,并试图避开它们。本文提出了两种新技术来强化CSG,防止自动和虚假用户回答。多态对话框不断改变所需用户输入的形式,并故意延迟后者,迫使用户注意安全决策。经过审计的对话通过(1)警告用户,他们的回答将被转发给审核员,以及(2)允许审核员隔离提供不合理答案的用户,从而阻止错误的用户回答。我们在雷鸟电子邮件代理上实现了针对电子邮件传播的病毒的CSG。一个版本,CSG- pd,包括CSG和多态对话。另一个版本CSG- pad包括CSG和多态对话框和审计对话框。在用户研究中,我们发现未经训练的用户接受CSG-PD的不合理风险明显低于常规对话。此外,与CSG-PD相比,他们接受CSG-PAD的不合理风险要小得多。CSG-PD和CSG-PAD对合理风险接受的影响不显著。
{"title":"Improving security decisions with polymorphic and audited dialogs","authors":"J. Brustoloni, Ricardo Villamarín-Salomón","doi":"10.1145/1280680.1280691","DOIUrl":"https://doi.org/10.1145/1280680.1280691","url":null,"abstract":"Context-sensitive guidance (CSG) can help users make better security decisions. Applications with CSG ask the user to provide relevant context information. Based on such information, these applications then decide or suggest an appropriate course of action. However, users often deem security dialogs irrelevant to the tasks they are performing and try to evade them. This paper contributes two new techniques for hardening CSG against automatic and false user answers. Polymorphic dialogs continuously change the form of required user inputs and intentionally delay the latter, forcing users to pay attention to security decisions. Audited dialogs thwart false user answers by (1) warning users that their answers will be forwarded to auditors, and (2) allowing auditors to quarantine users who provide unjustified answers. We implemented CSG against email-borne viruses on the Thunderbird email agent. One version, CSG-PD, includes CSG and polymorphic dialogs. Another version, CSG-PAD, includes CSG and both polymorphic and audited dialogs. In user studies, we found that untrained users accept significantly less unjustified risks with CSG-PD than with conventional dialogs. Moreover, they accept significantly less unjustified risks with CSG-PAD than with CSG-PD. CSG-PD and CSG-PAD have insignificant effect on acceptance of justified risks.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
Modeling user choice in the PassPoints graphical password scheme 在PassPoints图形密码方案中建模用户选择
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280684
A. Dirik, N. Memon, J. Birget
We develop a model to identify the most likely regions for users to click in order to create graphical passwords in the PassPoints system. A PassPoints password is a sequence of points, chosen by a user in an image that is displayed on the screen. Our model predicts probabilities of likely click points; this enables us to predict the entropy of a click point in a graphical password for a given image. The model allows us to evaluate automatically whether a given image is well suited for the PassPoints system, and to analyze possible dictionary attacks against the system. We compare the predictions provided by our model to results of experiments involving human users. At this stage, our model and the experiments are small and limited; but they show that user choice can be modeled and that expansions of the model and the experiments are a promising direction of research.
我们开发了一个模型来确定用户最可能点击的区域,以便在paspoints系统中创建图形化密码。PassPoints密码是一个点序列,由用户在屏幕上显示的图像中选择。我们的模型预测可能点击点的概率;这使我们能够预测给定图像的图形密码中点击点的熵。该模型允许我们自动评估给定的图像是否非常适合paspoints系统,并分析针对系统的可能的字典攻击。我们将模型提供的预测结果与涉及人类用户的实验结果进行比较。在这个阶段,我们的模型和实验是小而有限的;但他们表明,用户的选择是可以建模的,而模型和实验的扩展是一个有前途的研究方向。
{"title":"Modeling user choice in the PassPoints graphical password scheme","authors":"A. Dirik, N. Memon, J. Birget","doi":"10.1145/1280680.1280684","DOIUrl":"https://doi.org/10.1145/1280680.1280684","url":null,"abstract":"We develop a model to identify the most likely regions for users to click in order to create graphical passwords in the PassPoints system. A PassPoints password is a sequence of points, chosen by a user in an image that is displayed on the screen. Our model predicts probabilities of likely click points; this enables us to predict the entropy of a click point in a graphical password for a given image. The model allows us to evaluate automatically whether a given image is well suited for the PassPoints system, and to analyze possible dictionary attacks against the system. We compare the predictions provided by our model to results of experiments involving human users. At this stage, our model and the experiments are small and limited; but they show that user choice can be modeled and that expansions of the model and the experiments are a promising direction of research.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114488722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 286
期刊
Symposium On Usable Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1