On Multiple Password Interference of Touch Screen Patterns and Text Passwords

被引:20
作者
Meng, Weizhi [1 ]
Li, Wenjuan [2 ]
Jiang, Lijun [2 ]
Meng, Liying [2 ]
机构
[1] Inst Infocomm Res, Infocomm Secur Dept, Singapore, Singapore
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
来源
34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016 | 2016年
关键词
User Authentication; Android Unlock Pattern; Multiple Password Interference; Graphical Password; Usable Security;
D O I
10.1145/2858036.2858547
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The memorability of multiple passwords is an important topic for user authentication systems. With the advent of Android unlock pattern mechanism, research studies started investigating its usability and security features. This paper presents a study of recalling multiple passwords between text passwords and touch screen unlock patterns, as well as exploring whether users have difficulty in remembering those patterns after a period of time. In our study, participants create unlock patterns for various account scenarios. Our results reveal that participants in the unlock pattern condition with three accounts can outperform those in the text password condition (i.e., achieve higher success rates), not only in a one-hour session (short-term), but also after two weeks (long-term). However, there was no statistically significant difference between participants in the text password and unlock pattern condition in the long-term, when dealing with six accounts.
引用
收藏
页码:4818 / 4822
页数:5
相关论文
共 13 条
[1]  
Andriotis Panagiotis, 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P115, DOI 10.1007/978-3-319-07620-1_11
[2]  
Andriotis P., 2013, Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, P1, DOI DOI 10.1145/2462096.2462098
[3]  
Aviv AJ., 2010, P 4 USENIX C OFF TEC, V10, P1
[4]   Graphical Passwords: Learning from the First Twelve Years [J].
Biddle, Robert ;
Chiasson, Sonia ;
Van Oorschot, P. C. .
ACM COMPUTING SURVEYS, 2012, 44 (04)
[5]   Generating and remembering passwords [J].
Brown, AS ;
Bracken, E ;
Zoccoli, S ;
Douglas, K .
APPLIED COGNITIVE PSYCHOLOGY, 2004, 18 (06) :641-651
[6]  
Davies D. R., 2004, Proceedings of the Society of Feed Technologists, 2003, P1
[7]  
Tao H., 2008, International Journal of Network Security, V7, P273, DOI DOI 10.6633/IJNS.200809.7(2).18
[8]  
Uellenbeck S., 2013, CCS'13 Proc. 2013 ACM SIGSAC Conf. Comput. Commun. Secur, P161, DOI DOI 10.1145/2508859.2516700
[9]  
von Zezschwitz E., 2013, PROC MOBILEHCI 13, P261, DOI DOI 10.1145/2493190.2493231
[10]   Easy to Draw, but Hard to Trace? On the Observability of Grid-based (Un) lock Patterns [J].
von Zezschwitz, Emanuel ;
De Luca, Alexander ;
Janssen, Philipp ;
Hussmann, Heinrich .
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, :2339-2342