Who Are You?! Adventures in Authentication

All sessions will be held in Denver Ballroom 3 unless otherwise noted.
Papers are available for download below to registered attendees now and to everyone beginning June 22, 2016. Paper abstracts are available to everyone now. Copyright to the individual works is retained by the author[s].

Downloads for Registered Attendees

Attendee Files 
Who Are You?! Adventures in Authentication Paper Archive (ZIP)

 

Wednesday, June 22, 2016

7:30 am–8:30 am Wednesday

Continental Breakfast

Ballroom Foyer

8:30 am–8:40 am Wednesday
8:40 am–10:00 am Wednesday

Strengthening Passwords

Strengthening Password-based Authentication

Scott Ruoti, Jeff Andersen, and Kent Seamons, Brigham Young University

Even with years of research into new authentication technologies, passwords still dominate the authentication landscape. This is due primarily to a combination of security, deployability, and usability that has been difficult to match. While password alternatives exist, their lack of widespread adoption indicates that for the foreseeable future passwords are here to stay.

Our research goal is to strengthen, not replace, password-based authentication. We focus on two serious problems with password-based authentication. First, poor security practices at the web servers leads to stolen password files that are easily compromised using an offline attack. Second, passwords are too easily stolen via phishing attacks.

Both of these problems arise because for the vast majority of authentication flows, servers require users to provide their plaintext passwords. In the case of a legitimate server receiving this password, the user must blindly trust that the server correctly salts and hashes the password. Experience, though, has shown that many websites do not follow proper password storage. Moreover, there is a disconnect between perceived best practices for password storage and actual best practices.

Even if websites were to safely store users' passwords, users would still be at risk to phishing attacks. Phishers impersonate legitimate websites in order to trick users into sending their authentication credentials to the phishing website. The problem of phishing is only compounded by password reuse, allowing a single stolen password to potentially compromise many of the user's sites.

In this paper, we describe two methods for strengthening existing password-based authentication: strong password protocols and safe password entry.

Available Media

Standard Metrics and Scenarios for Usable Authentication

Scott Ruoti and Kent Seamons, Brigham Young University

There is a constant flow of new authentication schemes proposed in the literature. In the past, most proposed schemes were not evaluated empirically, though in recent years there has been an increase in the number of authentication systems that have undergone a user study. Still, most of these user studies employ ad-hoc metrics (e.g., task completion time) and a unique scenario. Bonneau et al. included usability criteria in their heuristic evaluation of various types of web authentication mechanisms.

The use of ad hoc and disparate metrics and scenarios makes it difficult to compare the relative merit of these various proposals. This produces disjointed results that hinder our ability to make more rapid, scientific progress toward usable authentication systems. Based on our experience, we believe that the community would benefit significantly from the adoption of standard metrics and scenarios for use in the empirical evaluation of authentication schemes.

Available Media

Recovering High-Value Secrets with SGX and Social Authentication

Nathan Malkin, Serge Egelman, and David Wagner, University of California, Berkeley

10:00 am–10:30 am Wednesday

Break with Refreshments

Ballroom Foyer

10:30 am–12:10 pm Wednesday

The Future of Authentication

Who Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User Authentication

Raghav V. Sampangi and Kirstie Hawkey, Dalhousie University

In this position paper, we present a new mechanism for contextdependent user authentication. We propose an approach in which the type of authentication (single/two factor, two-step, etc.) and the choice of the authentication mechanisms (algorithms/protocols used) vary dynamically, depending on contextual information.

Available Media

Exploring Games for Improved Touchscreen Authentication on Mobile Devices

Padmaja Scindia and Jonathan Voris, New York Institute of Technology

Mobile device theft is a growing problem. Yet due to usability issues and other concerns, people frequently choose not to use an authentication mechanism to protect their devices, putting the sensitive information that they store at risk. In order to provide mobile device owners with more usable authentication, we propose the study and development of mechanisms for authenticating users to mobile devices by modeling the manner in which they interact with games. We conducted an preliminary IRB approved study in which 12 users were asked to play 3 of the most popular games available in the Google Play Store on an Android device while their touchscreen interactions were logged. We then applied a Support Vector Machine to classify users based on 19 extracted touchscreen usage features. We were successfully able to classify over 90% of the samples for each game with a false reject rate of less than 1%. These results indicate that utilizing gameplay elements to encourage unique behavioral touchscreen features may be a promising direction of future research.

Available Media

Social Authentication for End-to-End Encryption

Elham Vaziripour, Mark O'Neill, Justin Wu, Scott Heidbrink, Kent Seamons, and Daniel Zappala, Brigham Young University

Over the last several decades, it has become increasingly important to secure data via end-to-end encryption. The Internet has evolved to provide security for connections, primarily using TLS (or SSL), but generally fails to provide true end-to-end encryption. While TLS and similar protocols encrypt data during transit, data at rest is often unprotected, residing in storage on a client or server machine in plaintext. Data in this state are susceptible to honest-but-curious service providers, hackers, physical theft, and coercive governments.

Generic public-key cryptography provides powerful mechanisms to enable end-to-end encryption, but providing good usability for these mechanisms is a challenging task for novice users|leading to the decades-long situation where "Johnny can't encrypt". The primary problems center on user-to-user authentication { authenticating users to each other by associating their identities with public keys. We have made signi cant progress authenticating web sites to users (via X509 certi cates and associated authorities) and authenticating users to web sites (with passwords). Each of these have their challenges, but have at least been widely deployed. Authenticating users to one another, however, has seen relatively little adoption. Usable mechanisms for personal key management, key distribution, and key authentication are still largely open issues.

Available Media

Authentication Feature and Model Selection using Penalty Algorithms

Rahul Murmuria and Angelos Stavrou, Kryptowire

Continuous Authentication (CA) is the process of verifying the identity of the user of an electronic device repeatedly while the device is in use. Existing research in the field employs metrics such as Equal Error Rate (EER) and/or the Receiver Operating Characteristic (ROC) to evaluate the performance in the same way as ‘entry-point’ biometric authentication schemes. These metrics have various shortcomings with regard to CA as they fail to model the practical implications of the authentication process. We would like to discuss and get feedback on performance evaluation techniques that capture practical aspects of the authentication system including the length and frequency of times an impostor reaches different authentication levels and similarly for the genuine user. Our preliminary results show that a multi-level authentication system is not only more accurate than a binary diagnosis but it allows for high level of accuracy. We posit that further research is needed in developing such a metric for truly evaluating a CA system.

Available Media

Who Are You Now? Fading to Multiple Personas

Sven Dietrich, CUNY John Jay College; Michael Brenner, Leibniz University Hannover; and Katharina Krombholz, SBA Research

There is strong support for single sign-on, using methods such as Facebook, Google, or Amazon for providing third-party sign-on to websites. While it is practical to the user, it carries a large risk: a compromise of the account credentials can lead to a severe impact on the websites the user authenticates to, and unwanted linkages between intentionally separated social roles, or personas. Moreover, we increasingly use mobile devices and theft of a device carrying credentials could have dire consequences, potentially based on different perceptions of risk. Our perceptions of risk we may assign to each world we authenticate to may be different and very individual, and that separation may be indeed necessary, albeit cumbersome.

Available Media
12:10 pm–1:40 pm Wednesday

Lunch (on your own)

1:40 pm–3:00 pm Wednesday

Mobile Authentication

Implications of the Use of Emojis in Mobile Authentication

Lydia Kraus and Robert Schmidt, Technische Universität Berlin; Marcel Walch, Ulm University; Florian Schaub, Carnegie Mellon University; Christopher Krügelstein and Sebastian Möller, Technische Universität Berlin

The use of Emojis has been proposed for use in mobile authentication. Emojis are small icons, e.g., smileys or objects, that are often used in digital communication to express emotions. Our interest lies in better understanding the implications of Emoji-based passwords. Can they potentially enhance the user experience of knowledge-based authentication or is their use just a gimmick? In the following, we reflect on the implications of using Emojis to create a positive mobile authentication experience for users. We further present the results of a user study for which we developed a study artifact named EmojiAuth.

Available Media

Picking a (Smart)Lock: Locking Relationships on Mobile Devices

Elizabeth Stobert and David Barrera, ETH Zürich

The last decade has seen an explosion of mobile device deployment and adoption. As these devices take on a more central role in users' everyday lives, the security of these devices becomes paramount. In addition to providing access to data stored elsewhere, smartphones and tablets often store considerable personal data locally, increasing the importance of only allowing legitimate access to the device. Local authentication to the device is thus of central importance in a user's security management tasks.

The environmental requirements of mobile users fundamentally change the threat model and design requirements for device authentication from the traditional "desktop"paradigm. Mobile devices are used in a variety of physical environments, and are thus not protected by the physical security measures that protect desktop computers. Mobile devices are exposed to a wider variety of potential attackers, and do not benefit from the predictable environments enjoyed by home and office computers. This portability, combined with increased exposure to people and unknown environments, leads to higher susceptibility to theft and loss.

Available Media

Advancing the Understanding of Android Unlocking and Usage

Lina Qiu, Ildar Muslukhov, and Konstantin Beznosov, University of British Columbia

Given the fact that personal mobile devices provide access to and/or store a great deal of personal and sensitive data, including passwords, contacts, les, emails, etc., it is not surprising that unauthorized access to the device is one of the highest security risks for smartphone users. To protect such data and services from unauthorized access, some smartphone users lock their phones using PIN, password, biometrics and DAP (\draw a pattern"). Yet, others don't, risking the data and online services accessible through their devices, mainly because of the inconvenience of unlocking, lack of motivation and awareness. One way to improve user behaviour is to o er them more usable unlocking mechanisms, without sacrificing the security. It remains an open problem, however, how to optimize both security and usability for smartphone unlocking mechanisms. Thus, it is important for researchers to understand the interplay between security and usability of unlocking mechanisms in situ. To this end, we are preparing a longitudinal eld study, in the course of which our monitoring app installed on the participants' Android smartphones will collect detailed relevant data.

Available Media

Examining Visual-Spatial Paths for Mobile Authentication

David Lu, Taehoon Lee, Sauvik Das, and Jason Hong, Carnegie Mellon University

Inspired by people’s strong memory for visual-spatial paths (e.g., commuting paths), we present in this paper an introductory exploration of the use of these paths for memorable, strong mobile authentication. In a preliminary study, we evaluated several low-fidelity representations for encoding relatively strong (~20 bit) secrets as visual-spatial paths: a 2D birds-eye view, a 3D third-person view, and 3D immersed view. We found that the 3D immersed view worked best for memorability, and used this initial study to inspire the design for a novel mobile authentication application: the Memory Palace. We ran a within-subjects experiment to evaluate our Memory Palace authentication concept against Android’s 9-dot Patternlock along two dimensions: memorability and resilience to shoulder surfing. Results from our experiment suggest people have significantly higher memorability for visual-spatial secrets encoded in the Memory Palace which were also significantly more resilient against shoulder surfing. We conclude with directions for further work: specifically, creating sharable paths for more socially compatible authentication and segmenting secret paths for simple, non-binary access control.

Available Media
3:00 pm–3:30 pm Wednesday

Break with Refreshments

Ballroom Foyer

3:30 pm–4:30 pm Wednesday

Cognition and Passwords

Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords

Adam J. Aviv, United States Naval Academy; Markus Dürmuth, Ruhr-University Bochum; Payas Gupta, New York University Abu Dhabi

Android's graphical password scheme (sometimes referred to as the "password pattern") is perhaps the most widely used and most studied graphical password system to date. With its launch, Android's only authentication/unlock mechanism was the graphical password; however, other authentication systems are allowed today, such as PINs and text-based passwords. Despite the added authentication choices, the graphical password option remains a very popular choice among Android users.

The graphical password system requires users to select and recall a "pattern" drawn over a 3x3 grid of contact points, connecting between 4 and 9 contact points, without repetition. There are 392,112 possible password, which provide more choices than a 4-digit PIN (10,000); however, like all password systems, users do not choose uniformly from the set of available passwords. Recent studies have shown that the guessability strength of user-generated password patterns is on the order of a random 3-digit PIN and provides weaker security than one might expect.

Available Media

Effect of Cognitive Effort on Password Choice

Thomas Groß, Kovila P.L. Coopamootoo, and Amina Al-Jabri, Newcastle University

This paper reports on a lab experiment with 100 subjects which is the first to investigate the impact of cognitive effort and depletion on the choice of user passwords. Two groups of 50 subjects each were asked to generate a password. One group was cognitively depleted, the other was not. Password strength was measured and compared across groups. We find that subjects who are cognitively depleted create worse passwords than undepleted subjects. Surprisingly, subjects who report mild cognitive exertion create better password than undepleted subjects. We are interested in discussing how cognitive effort impacts authentication as well as how to negotiate the cognitive demands of password procedures to best support users.

Available Media

Discussion



4:30 pm–4:40 pm Wednesday

Closing

5:15 pm–7:00 pm Wednesday

SOUPS 2016 Poster Session and Happy Hour

Colorado Ballroom A–E