A Comparative Long-Term Study of Fallback Authentication Schemes

被引:0
作者
Lassak, Leona [1 ]
Markert, Philipp [1 ]
Golla, Maximilian [2 ]
Stobert, Elizabeth [3 ]
Duermuth, Markus [4 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[3] Carleton Univ, Ottawa, ON, Canada
[4] Leibniz Univ Hannover, Hannover, Germany
来源
PROCEEDINGS OF THE 2024 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYTEMS (CHI 2024) | 2024年
关键词
fallback authentication; email; SMS; personal knowledge questions; SECURITY; WEB;
D O I
10.1145/3613904.3642889
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Fallback authentication, the process of re-establishing access to an account when the primary authenticator is unavailable, holds critical signifcance. Approaches range from secondary channels like email and SMS to personal knowledge questions (PKQs) and social authentication. A key diference to primary authentication is that the duration between enrollment and authentication can be much longer, typically months or years. However, few systems have been studied over extended timeframes, making it difcult to know how well these systems truly help users recover their accounts. We also lack meaningful comparisons of schemes as most prior work examined two mechanisms at most. We report the results of a long-term user study of the usability of fallback authentication over 18 months to provide a fair comparison of the four most commonly used fallback authentication methods. We show that users prefer email and SMS-based methods, while mechanisms based on PKQs and trustees lag regarding successful resets and convenience.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] The contribution of foresight to improve long-term security planning
    Jore, Sissel Haugdal
    Utland, Inger-Lise Forland
    Vatnamo, Victoria Hell
    FORESIGHT, 2018, 20 (01): : 68 - 83
  • [22] The Threats of Privatization to Security in Long-Term Residential Care
    Armstrong, Pat
    Armstrong, Hugh
    MacLeod, Krystal Kehoe
    AGEING INTERNATIONAL, 2016, 41 (01): : 99 - 116
  • [23] Long-term verifiability of the electronic healthcare records' authenticity
    Lekkas, Dimitrios
    Gritzalis, Dimitris
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (5-6) : 442 - 448
  • [24] Long-term private renters: Perceptions of security and insecurity
    Morris, Alan
    Hulse, Kath
    Pawson, Hal
    JOURNAL OF SOCIOLOGY, 2017, 53 (03) : 653 - 669
  • [25] RFID Security and Privacy: Long-term Research or Short-term Tinkering?
    Tsudik, Gene
    Burmester, Mike
    Juels, Ari
    Kobsa, Alfred
    Molnar, David
    Di Pietro, Roberto
    Rieback, Melanie
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 160 - 160
  • [26] Study on China's energy system resilience under the scenarios of long-term shortage of imported oil
    Chen, Sai
    Ding, Yueting
    Song, Yan
    Zhang, Ming
    Nie, Rui
    ENERGY, 2023, 270
  • [27] Patterns of Stepfamily Relationship Quality and Adolescents' Short-Term and Long-Term Adjustment
    Jensen, Todd M.
    Lippold, Melissa A.
    JOURNAL OF FAMILY PSYCHOLOGY, 2018, 32 (08) : 1130 - 1141
  • [28] Pipelined algorithms to detect cheating in long-term grid computations
    Goodrich, Michael T.
    THEORETICAL COMPUTER SCIENCE, 2008, 408 (2-3) : 199 - 207
  • [29] A Smart-Mutual Decentralized System for Long-Term Care
    Chou, Hsien-Ming
    APPLIED SCIENCES-BASEL, 2022, 12 (07):
  • [30] Economically and environmentally sustainable long-term power system expansion
    Selcuklu, Saltuk B.
    Rodgers, Mark D.
    Movlyanov, Atabek
    COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 164