Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2501604.2501618acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Usability and security evaluation of GeoPass: a geographic location-password scheme

Published:24 July 2013Publication History

ABSTRACT

We design, implement, and evaluate GeoPass: an interface for digital map-based authentication where a user chooses a place as his or her password (i.e., a "location-password"). We conducted a multi-session in-lab/at-home user study to evaluate the usability, memorability, and security of location-passwords created with GeoPass. The results of our user study found that 97% of users were able to remember their location-password over the span of 8-9 days and most without any failed login attempts. Users generally welcomed GeoPass; all of the users who completed the study reported that they would at least consider using GeoPass for some of their accounts. We also perform an in-depth usability and security analysis of location-passwords. Our security analysis includes the effect of information that could be gleaned from social engineering. The results of our security analysis show that location-passwords created with GeoPass can have reasonable security against online attacks, even when accounting for social engineering attacks. Based on our results, we suggest GeoPass would be most appropriate in contexts where logins occur infrequently, e.g., as an alternative to secondary authentication methods used for password resets, or for infrequently used online accounts.

References

  1. A. De Angeli, L. Coventry, G. Johnson, and K. Renaud. Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems. International Journal of Human-Computer Studies, 63(1-2):128--152, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith. Smudge Attacks on Smartphone Touch Screens. In Proceedings of the 4th USENIX Conference on Offensive technologies, WOOT'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. K. Bicakci and P. C. van Oorschot. A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation. In Proceedings of the New Security Paradigms Workshop (NSPW), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Biddle, S. Chiasson, and P. C. Van Oorschot. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys, 44(4), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. C. Birget, D. Hong, and N. Memon. Robust Discretization, with an Application to Graphical Passwords. IEEE Transactions on Information Forensics and Security, 1:395--399, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Bonneau. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In 2012 IEEE Symposium on Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Bonneau, M. Just, and G. Matthews. What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions. In Financial Cryptography and Data Security. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Brostoff and A. Sasse. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In Proceedings of HCI 2000, pages 405--424, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  9. Statistics Canada. Population and Dwelling Counts, For Canada, Provinces and Territories, and Census Divisions, 2006 and 2001 Censuses. http://www12.statcan.ca/english/census06/data/popdwell/Table.cfm?T=702&PR=35&SR=1&S=3&O=D, site accessed September 18, 2012.Google ScholarGoogle Scholar
  10. Travel Channel. Top 10 Vacation Spots. http://www.travelchannel.com/interests/travel-tips/articles/top-10-vacation-spots, site accessed March 2, 2013.Google ScholarGoogle Scholar
  11. S. Chiasson, J. Srinivasan, R. Biddle, and P. C. van Oorschot. Centered Discretization with Application to Graphical Passwords. In Proceedings of the 1st Conference on Usability, Psychology, and Security, UPSEC'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. C. van Oorschot. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. IEEE Transactions on Dependable and Secure Computing, 9(2):222--235, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Chiasson, P. C. van Oorschot, and R. Biddle. A Second Look at the Usability of Click-Based Graphical Passwords. In SOUPS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Davis, F. Monrose, and M. K. Reiter. On User Choice in Graphical Password Schemes. In USENIX Security, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Dhamija and A. Perrig. Déjà Vu: A User Study Using Images for Authentication. In Proceedings of the 9th USENIX Security Symposium, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Dunphy and J. Yan. Do Background Images Improve Draw-A-Secret Graphical Passwords? In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. M. Everitt, T. Bragin, J. Fogarty, and T. Kohno. A Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Forget, S. Chiasson, and R. Biddle. Shoulder-Surfing Resistance with Eye-Gaze Entry in Cued-Recall Graphical Passwords. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Fox. Future Online Password Could be a Map, 2010. http://www.livescience.com/8622-future-online-password-map.html, site accessed March 2, 2013.Google ScholarGoogle Scholar
  20. E. Hayashi and J. Hong. A Diary Study of Password Usage in Daily Life. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P. G. Inglesant and M. A. Sasse. The True Cost of Unusable Password Policies: Password Use in the Wild. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. Javed, S. Ghani, and N. Elmqvist. Polyzoom: Multiscale and multifocus exploration in 2d visual spaces. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The Design and Analysis of Graphical Passwords. In USENIX Security, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. A. Khot, K. Srinathan, and P. Kumaraguru. MARASIM: A Novel Jigsaw Based Authentication Scheme Using Tagging. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Kim, X. Cao, H. Zhang, and D. Tan. Enabling Concurrent Dual Views on Common LCD Screens. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Madigan. Picture Memory. In J. C. Yuille, editor, Imagery, Memory and Cognition. Lawrence Erlbaum Assoc., 1983.Google ScholarGoogle Scholar
  27. D. Nelson, V. Reed, and J. Walling. Pictorial Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory, 2(5):523--528, 1976.Google ScholarGoogle ScholarCross RefCross Ref
  28. New World Encyclopedia contributors. List of Countries and Outlying Territories by Total Area, 2008. http://www.newworldencyclopedia.org/p/index.php?title=List_of_countries_and_outlying_territories_by_total_area&oldid=866335, site accessed March 2, 2013.Google ScholarGoogle Scholar
  29. S. Nichols. Google Patents Eye-Tracking for Google Glass, 2012. http://www.techradar.com/news/portable-devices/google-patents-eye-tracking-for-google-glass-1091428, site accessed March 8, 2013.Google ScholarGoogle Scholar
  30. Passlogix. http://www.passlogix.com, site accessed Feb. 2, 2007.Google ScholarGoogle Scholar
  31. Real User Corporation. About Passfaces. http://www.realuser.com, site accessed April 2012.Google ScholarGoogle Scholar
  32. S. Schechter, A. J. B. Brush, and S. Egelman. It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. S. Sinofsky. Signing in With a Picture Password, 2011. http://blogs.msdn.com/b/b8/archive/2011/12/16/signing-in-with-a-picture-password.aspx, accessed April 2012.Google ScholarGoogle Scholar
  34. J. Spitzer, C. Singh, and D. Schweitzer. A Security Class Project in Graphical Passwords. Journal of Computing Sciences in Colleges, 26(2):7--13, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. H. Sun, Y. Chen, C. Fang, and S. Chang. PassMap: A Map Based Graphical-Password Authentication System. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. H. Tao and C. Adams. Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. International Journal of Network Security, 2(7):273--292, 2008.Google ScholarGoogle Scholar
  37. J. Thorpe and P. C. van Oorschot. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In USENIX Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Tripadvisor. http://www.tripadvisor.com, site accessed August 22, 2012.Google ScholarGoogle Scholar
  39. M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords. In Proceedings of the 17th ACM conference on Computer and Communications Security, CCS '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. PassPoints: Design and Longitudinal Evaluation of a Graphical Password System. Int. J. Hum.-Comput. Stud., 63(1-2):102--127, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security and Privacy, 2(5):25--31, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Usability and security evaluation of GeoPass: a geographic location-password scheme

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '13: Proceedings of the Ninth Symposium on Usable Privacy and Security
          July 2013
          241 pages
          ISBN:9781450323192
          DOI:10.1145/2501604

          Copyright © 2013 Copyright is held by the owner/author(s)

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 July 2013

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader