Guessing attacks on user-generated gesture passwords

被引:12
作者
Liu, Can [1 ]
Clark, Gradeigh D. [1 ]
Lindqvist, Janne [1 ]
机构
[1] Rutgers University, Electrical and Computer Engineering Building, 94 Brett Road, Piscataway,NJ,08854, United States
关键词
Cracks - Computer crime - Authentication;
D O I
10.1145/3053331
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Touchscreens, the dominant input type for mobile phones, require unique authentication solutions. Gesture passwords have been proposed as an alternative ubiquitous authentication technique. Prior security analysis has relied on inconsistent measurements such as mutual information or shoulder surfing attacks. We present the first approach for measuring the security of gestures with guessing attacks that model real-world attacker behavior. Our major contributions are: 1) a comprehensive analysis of the weak subspace for gesture passwords, 2) a method for enumerating the size of the full theoretical gesture password space, 3) a design of a novel guessing attack against user-chosen gestures using a dictionary, and 4) a brute-force attack used for benchmarking the performance of the guessing attack. Our dictionary attack, tested on newly collected user data, achieves a cracking rate of 47.71% after two weeks of computation using 109 guesses. This is a difference of 35.78 percentage points compared to the 11.93% cracking rate of the brute-force attack. In conclusion, users are not taking full advantage of the large theoretical password space and instead choose their gesture passwords from weak subspaces. We urge for further work on addressing this challenge. © 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM.
引用
收藏
相关论文
empty
未找到相关数据