A Graphical Password Scheme Based on Rounded Image Selection

被引:1
作者
Qin, Xinyuan [1 ]
Li, Wenjuan [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Elect & Informat Engn, Hong Kong, Peoples R China
来源
SCIENCE OF CYBER SECURITY, SCISEC 2023 | 2023年 / 14299卷
关键词
Graphical Password; Password Security; Usability; Shoulder-surfing Attack; User Authentication; Image Selection; USAGE ANALYSIS; AUTHENTICATION; SECURITY; DESIGN; ATTACK; TOUCH;
D O I
10.1007/978-3-031-45933-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Graphical password is considered as an alternative to traditional textual password, but it also faces many threats such as shoulder-surfing attack. To design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several rounds of input. For example, with respect to shoulder-surfing attack resistance, the input design ought to incorporate a certain degree of fault tolerance, with the specific value determined based on the acceptable tolerance range. By integrating this fault tolerance characteristic, the system can effectively withstand shoulder-surfing attacks while preserving the integrity of the authentication procedure. In this work, we learn from the current literature and design a graphical password scheme based on rounded image selection (e.g., three rounds). We provide a detailed scheme design and perform a performance analysis via a user study. Our results indicate that our proposed scheme is viable and gets credit from the participants.
引用
收藏
页码:97 / 114
页数:18
相关论文
共 47 条
[1]  
Aviv A. J., 2010, P 4 USENIX C OFF TEC, P1
[2]   Graphical Passwords: Learning from the First Twelve Years [J].
Biddle, Robert ;
Chiasson, Sonia ;
Van Oorschot, P. C. .
ACM COMPUTING SURVEYS, 2012, 44 (04)
[3]   Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services [J].
Chakraborty, Nilesh ;
Anand, Vijay S. ;
Mondal, Samrat .
COMPUTERS & SECURITY, 2019, 84 :193-205
[4]   Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism [J].
Chiasson, Sonia ;
Stobert, Elizabeth ;
Forget, Alain ;
Biddle, Robert ;
van Oorschot, Paul C. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) :222-235
[5]  
Dhamija R, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, P45
[6]  
Dirik AhmetEmir., 2007, Proceedings of the 3rd symposium on Usable privacy and security, P20
[7]  
Dunphy P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P36
[8]  
Golofit K, 2007, LECT NOTES COMPUT SC, V4734, P343
[9]  
Jermyn I, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P1
[10]  
Li W., 2023, IEEE Transactions on Consumer Electronics