Training Johnny to Authenticate (Safely)

被引:2
作者
Herzberg, Amir [1 ]
Margulies, Ronen [1 ]
机构
[1] Bar Ilan Univ, Dept Comp Sci, IL-52100 Ramat Gan, Israel
关键词
SECURITY;
D O I
10.1109/MSP.2011.129
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authors present the results of a long-term user study of site-based login mechanisms that train users to log in safely. Interactive site-identifying images received 70 percent detection rates, which is significantly better than the 20 percent received by the typical login ceremony. They also found that combining login bookmarks with interactive images and nonworking buttons or links (called negative training functions) achieved the best detection rates (82 percent) and overall resistance rates (93 percent). Because interactive custom images provide effective user training against phishing, the authors extended its authentication usages. The authors present an adaptive authentication mechanism based on recognition of multiple custom images, which can be used for different Web and mobile authentication scenarios. The mechanism relies on memorization of the custom images on each primary login, adaptively increasing the authentication difficulty on detection of impersonation attacks, and recognizing all images for fallback authentication. © 2012 IEEE.
引用
收藏
页码:37 / 45
页数:9
相关论文
共 14 条
[1]  
Adida B, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P48
[2]  
[Anonymous], 2006, P SIGCHI C HUM FACT, DOI 10.1145/1124772.1124861
[3]  
Boyle M., 2011, P 9 ANN INT C MOB SY, P395
[4]  
Dhamija R., 2000, P C USENIX SEC S, V9, P4
[5]   Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks [J].
Herzberg, Amir ;
Jbara, Ahmad .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2008, 8 (04)
[6]   Why Johnny can't surf (safely)? Attacks and defenses for web users [J].
Herzberg, Amir .
COMPUTERS & SECURITY, 2009, 28 (1-2) :63-71
[7]  
Jakobsson Markus., 2008, Proceedings of the 4th ACMworkshop on Digital identity management, DIM '08, P61, DOI [10.1145/1456424.1456435, DOI 10.1145/1456424.1456435]
[8]  
Karlof C.S., 2009, P 5 S US PRIV SEC SO, p[38, 1]
[9]  
Margulies R., 2011, THESIS BAR ILAN U
[10]   It's no secret Measuring the security and reliability of authentication via 'secret' questions [J].
Schechter, Stuart ;
Brush, A. J. Bernheim ;
Egelman, Serge .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :375-390