7:30 am–8:30 am |
Wednesday |
Continental Breakfast
Ballroom Foyer |
8:30 am–8:40 am |
Wednesday |
|
8:40 am–10:00 am |
Wednesday |
Scott Ruoti, Jeff Andersen, and Kent Seamons, Brigham Young University Even with years of research into new authentication technologies, passwords still dominate the authentication landscape. This is due primarily to a combination of security, deployability, and usability that has been difficult to match. While password alternatives exist, their lack of widespread adoption indicates that for the foreseeable future passwords
are here to stay.
Our research goal is to strengthen, not replace, password-based authentication. We focus on two serious problems with password-based authentication. First, poor security
practices at the web servers leads to stolen password files that are easily compromised using an offline attack. Second, passwords are too easily stolen via phishing attacks.
Both of these problems arise because for the vast majority of authentication flows, servers require users to provide their plaintext passwords. In the case of a legitimate server receiving this password, the user must blindly trust that the server correctly salts and hashes the password. Experience, though, has shown that many websites do not follow proper password storage. Moreover, there is a disconnect between perceived best practices for password storage and actual best practices.
Even if websites were to safely store users' passwords, users would still be at risk to phishing attacks. Phishers impersonate legitimate websites in order to trick users into sending their authentication credentials to the phishing website. The problem of phishing is only compounded by password reuse, allowing a single stolen password to potentially compromise many of the user's sites.
In this paper, we describe two methods for strengthening existing password-based authentication: strong password protocols and safe password entry.
Scott Ruoti and Kent Seamons, Brigham Young University There is a constant flow of new authentication schemes proposed in the literature. In the past, most proposed schemes were not evaluated empirically, though in recent years there has been an increase in the number of authentication systems that have undergone a user study. Still, most of these user studies employ ad-hoc metrics (e.g., task completion time) and a unique scenario. Bonneau et al. included usability criteria in their heuristic evaluation of various types of web authentication mechanisms.
The use of ad hoc and disparate metrics and scenarios makes it difficult to compare the relative merit of these various proposals. This produces disjointed results that hinder our ability to make more rapid, scientific progress toward usable authentication systems. Based on our experience, we believe that the community would benefit significantly from the adoption of standard metrics and scenarios for use in the empirical evaluation of authentication schemes.
Nathan Malkin, Serge Egelman, and David Wagner, University of California, Berkeley
Nata Barbosa and Yang Wang, Syracuse University
|
10:00 am–10:30 am |
Wednesday |
Break with Refreshments
Ballroom Foyer
|
10:30 am–12:10 pm |
Wednesday |
Raghav V. Sampangi and Kirstie Hawkey, Dalhousie University In this position paper, we present a new mechanism for contextdependent user authentication. We propose an approach in which the type of authentication (single/two factor, two-step, etc.) and the choice of the authentication mechanisms (algorithms/protocols used) vary dynamically, depending on contextual information.
Padmaja Scindia and Jonathan Voris, New York Institute of Technology Mobile device theft is a growing problem. Yet due to usability issues and other concerns, people frequently choose not to use an authentication mechanism to protect their devices, putting the sensitive information that they store at risk. In order to provide mobile device owners with more usable authentication, we propose the study and development of mechanisms for authenticating users to mobile devices by modeling the manner in which they interact with games. We conducted an preliminary IRB approved study in which 12
users were asked to play 3 of the most popular games available in the Google Play Store on an Android device while their touchscreen interactions were logged. We then applied
a Support Vector Machine to classify users based on 19 extracted touchscreen usage features. We were successfully able to classify over 90% of the samples for each game with
a false reject rate of less than 1%. These results indicate that utilizing gameplay elements to encourage unique behavioral touchscreen features may be a promising direction of future research.
Elham Vaziripour, Mark O'Neill, Justin Wu, Scott Heidbrink, Kent Seamons, and Daniel Zappala, Brigham Young University Over the last several decades, it has become increasingly important to secure data via end-to-end encryption. The Internet has evolved to provide security for connections, primarily using TLS (or SSL), but generally fails to provide true end-to-end encryption. While TLS and similar protocols encrypt data during transit, data at rest is often unprotected, residing in storage on a client or server machine in plaintext. Data in this state are susceptible to honest-but-curious service providers, hackers, physical theft, and coercive governments.
Generic public-key cryptography provides powerful mechanisms to enable end-to-end encryption, but providing good usability for these mechanisms is a challenging task for novice users|leading to the decades-long situation where "Johnny can't encrypt". The primary problems center on user-to-user authentication { authenticating users to each
other by associating their identities with public keys. We have made signicant progress authenticating web sites to users (via X509 certicates and associated authorities) and
authenticating users to web sites (with passwords). Each of these have their challenges, but have at least been widely deployed. Authenticating users to one another, however,
has seen relatively little adoption. Usable mechanisms for personal key management, key distribution, and key authentication are still largely open issues.
Rahul Murmuria and Angelos Stavrou, Kryptowire Continuous Authentication (CA) is the process of verifying the identity of the user of an electronic device repeatedly while the device is in use. Existing research in the field employs metrics such as Equal Error Rate (EER) and/or the Receiver Operating Characteristic (ROC) to evaluate the performance in the same way as ‘entry-point’ biometric authentication schemes. These metrics have various shortcomings with regard to CA as they fail to model the practical implications of the authentication process. We would like to discuss and get feedback on performance evaluation techniques that capture practical aspects of the authentication system including the length and frequency of times an impostor reaches different authentication levels and similarly for the genuine user. Our preliminary results show that a multi-level authentication system is not only more accurate than a binary diagnosis but it allows for high level of accuracy. We posit that further research is needed in developing such a metric for truly evaluating a CA system.
Sven Dietrich, CUNY John Jay College; Michael Brenner, Leibniz University Hannover; and Katharina Krombholz, SBA Research There is strong support for single sign-on, using methods such as Facebook, Google, or Amazon for providing third-party sign-on to websites. While it is practical to the user, it carries a large risk: a compromise of the account credentials can lead to a severe impact on the websites the user authenticates to, and unwanted linkages between intentionally separated social roles, or personas. Moreover, we increasingly use mobile devices and theft of a device carrying credentials could have dire consequences, potentially based on different perceptions of risk. Our perceptions of risk we may assign to each world we authenticate to may be different and very individual, and that separation may be indeed necessary, albeit cumbersome.
|
12:10 pm–1:40 pm |
Wednesday |
Lunch (on your own)
|
1:40 pm–3:00 pm |
Wednesday |
Lydia Kraus and Robert Schmidt, Technische Universität Berlin; Marcel Walch, Ulm University; Florian Schaub, Carnegie Mellon University; Christopher Krügelstein and Sebastian Möller, Technische Universität Berlin
The use of Emojis has been proposed for use in mobile authentication. Emojis are small icons, e.g., smileys or objects, that are often used in digital communication to express
emotions. Our interest lies in better understanding the implications of Emoji-based passwords. Can they potentially enhance the user experience of knowledge-based authentication or is their use just a gimmick? In the following, we reflect on the implications of using Emojis to create a positive mobile authentication experience for users. We further present the results of a user study for which we developed a study artifact named EmojiAuth.
Elizabeth Stobert and David Barrera, ETH Zürich The last decade has seen an explosion of mobile device deployment and adoption. As these devices take on a more central role in users' everyday lives, the security of these devices becomes paramount. In addition to providing access to data stored elsewhere, smartphones and tablets often store considerable personal data locally, increasing the importance of only allowing legitimate access to the device. Local authentication to the device is thus of central importance in a user's security management tasks.
The environmental requirements of mobile users fundamentally change the threat model and design requirements for device authentication from the traditional "desktop"paradigm. Mobile devices are used in a variety of physical environments, and are thus not protected by the physical security measures that protect desktop computers. Mobile devices are exposed to a wider variety of potential attackers, and do not benefit from the predictable environments enjoyed by home and office computers. This portability, combined with increased exposure to people and unknown environments, leads to higher susceptibility to theft and loss.
Lina Qiu, Ildar Muslukhov, and Konstantin Beznosov, University of British Columbia
Given the fact that personal mobile devices provide access to and/or store a great deal of personal and sensitive data, including passwords, contacts, les, emails, etc., it is not
surprising that unauthorized access to the device is one of the highest security risks for smartphone users. To protect such data and services from unauthorized access, some
smartphone users lock their phones using PIN, password, biometrics and DAP (\draw a pattern"). Yet, others don't, risking the data and online services accessible through their
devices, mainly because of the inconvenience of unlocking, lack of motivation and awareness. One way to improve user behaviour is to oer them more usable unlocking mechanisms, without sacrificing the security. It remains an open problem, however, how to optimize both security and usability for smartphone unlocking mechanisms. Thus, it is important for researchers to understand the interplay between security and usability of unlocking mechanisms in situ. To this end, we are preparing a longitudinal eld study, in the course of which our monitoring app installed on the participants' Android smartphones will collect detailed relevant data.
David Lu, Taehoon Lee, Sauvik Das, and Jason Hong, Carnegie Mellon University
Inspired by people’s strong memory for visual-spatial paths (e.g., commuting paths), we present in this paper an introductory exploration of the use of these paths for memorable, strong mobile authentication. In a preliminary study, we evaluated several low-fidelity representations for encoding relatively strong (~20 bit) secrets as visual-spatial paths: a 2D birds-eye view, a 3D third-person view, and 3D immersed view. We found that the 3D immersed view worked best for memorability, and used this initial study to inspire the design for a novel mobile authentication application: the Memory Palace. We ran a within-subjects experiment to evaluate our Memory Palace authentication concept
against Android’s 9-dot Patternlock along two dimensions: memorability and resilience to shoulder surfing. Results from our experiment suggest people have significantly higher memorability for visual-spatial secrets encoded in the Memory Palace which were also significantly more resilient against shoulder surfing. We conclude with directions for further work: specifically, creating sharable paths for more socially compatible authentication and segmenting secret paths for simple, non-binary access control.
|
3:00 pm–3:30 pm |
Wednesday |
Break with Refreshments
Ballroom Foyer
|
3:30 pm–4:30 pm |
Wednesday |
Adam J. Aviv, United States Naval Academy; Markus Dürmuth, Ruhr-University Bochum; Payas Gupta, New York University Abu Dhabi
Android's graphical password scheme (sometimes referred to as the "password pattern") is perhaps the most widely used and most studied graphical password system to date. With its launch, Android's only authentication/unlock mechanism was the graphical password; however, other authentication systems are allowed today, such as PINs and text-based passwords. Despite the added authentication choices, the graphical password option remains a very popular choice among Android users.
The graphical password system requires users to select and recall a "pattern" drawn over a 3x3 grid of contact points, connecting between 4 and 9 contact points, without repetition. There are 392,112 possible password, which provide more choices than a 4-digit PIN (10,000); however, like all password systems, users do not choose uniformly from the set of available passwords. Recent studies have shown that the guessability strength of user-generated password patterns is on the order of a random 3-digit PIN and provides weaker security than one might expect.
Thomas Groß, Kovila P.L. Coopamootoo, and Amina Al-Jabri, Newcastle University
This paper reports on a lab experiment with 100 subjects which is the first to investigate the impact of cognitive effort and depletion on the choice of user passwords. Two groups of 50 subjects each were asked to generate a password. One group was cognitively depleted, the other was not. Password strength was measured and compared across groups. We find that subjects who are cognitively depleted create worse passwords than undepleted subjects. Surprisingly, subjects who report mild cognitive exertion create better password than undepleted subjects. We are interested in discussing how cognitive effort impacts authentication as well as how to negotiate the cognitive demands of password procedures to best support users.
Discussion
|
4:30 pm–4:40 pm |
Wednesday |
Closing
|
5:15 pm–7:00 pm |
Wednesday |
SOUPS 2016 Poster Session and Happy Hour
Colorado Ballroom A–E
|