A New Graphical Password Scheme Resistant to Shoulder-Surfing

被引:24
作者
Gao, Haichang [1 ]
Ren, Zhongjie [1 ]
Chang, Xiuling [1 ]
Liu, Xiyang [1 ]
Aickelin, Uwe [2 ]
机构
[1] Xidian Univ, Inst Software Engn, Xian 710071, Shaanxi, Peoples R China
[2] Univ Nottingham, Sch Comp Sci, Nottingham NG8 1BB, England
来源
2010 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2010) | 2010年
基金
中国国家自然科学基金;
关键词
graphical password; shoulder-surfing; PDA; authentication;
D O I
10.1109/CW.2010.34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or by recording the authentication session. Due to the visual interface, this problem has become exacerbated in graphical passwords. There have been some graphical schemes resistant or immune to shoulder-surfing, but they have significant usability drawbacks, usually in the time and effort to log in. In this paper, we propose and evaluate a new shoulder-surfing resistant scheme which has a desirable usability for PDAs. Our inspiration comes from the drawing input method in DAS and the association mnemonics in Story for sequence retrieval. The new scheme requires users to draw a curve across their password images orderly rather than click directly on them. The drawing input trick along with the complementary measures, such as erasing the drawing trace, displaying degraded images, and starting and ending with randomly designated images provide a good resistance to shoulder-surfing. A preliminary user study showed that users were able to enter their passwords accurately and to remember them over time.
引用
收藏
页码:194 / 199
页数:6
相关论文
共 28 条
  • [1] [Anonymous], 2000, 9 USENIX SEC S
  • [2] [Anonymous], PASSFACES
  • [3] Biddle R., 2009, TR0909 CARL U SCH CO
  • [4] DAVIS D, 2004, P 13 USENIX SEC S SA
  • [5] Gao H., 2009, 5 INT C IM GRAPH, P722
  • [6] YAGP: Yet Another Graphical Password Strategy
    Gao, Haichang
    Guo, Xuewu
    Chen, Xiaoping
    Wang, Liming
    Liu, Xiyang
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 121 - 129
  • [7] Golle P., 2007, S SEC PRIV
  • [8] Hong D., 2004, P INT C SEC MAN LAS
  • [9] Jansen W., 2003, 7030 NISTIR
  • [10] Jermyn I., 1999, P 8 USENIX SEC S AUG