Exploiting predictability in click-based graphical passwords
نویسندگان
چکیده
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both shortand long-term user studies: one labcontrolled, involving 43 users and 17 diverse images, the other a field test of 223 user accounts. We provide empirical evidence that hot-spots do exist for many images, some more so than others. We explore the use of “human-computation” (in this context, harvesting click-points from a small set of users) to predict these hot-spots. We generate two “human-seeded” attacks based on this method: one based on a first-order Markov model, another based on an independent probability model. Within 100 guesses, our first-order Markov model-based attack finds 4% of passwords in one image’s data set, and 10% of passwords in a second image’s data set. Our independent model-based attack finds 20% within 2 guesses in one image’s data set and 36% within 2 guesses in a second image’s data set. These are all for a system whose full password space has cardinality 2. We also evaluate our first-order Markov model-based attack with cross-validation of the field study data, which finds an average of 7-10% of user passwords within 3 guesses. We also begin to explore some click-order pattern attacks, which we found improve on our independent model-based attacks. Our results suggest that these graphical password schemes (with parameters as originally proposed) are vulnerable to offline and online attacks, even on systems that implement conservative lock-out policies.
منابع مشابه
Helping Users Protect Themselves from e-Criminals in Click-Based Graphical Passwords
Click-based graphical passwords, like other user-selected passwords, suffer from predictability problems. With click-based graphical passwords, user click-points form hotspots, areas of the image that are more likely to be selected, which e-criminals can predict and use to launch dictionary attacks. Our system, Persuasive Cued Click-Points, helps users select more random click-points and reduce...
متن کاملOn Predicting and Exploiting Hot-Spots in Click-Based Graphical Passwords∗
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both shortand long-term user studies: one labcontrolled, involving 43 users and 17 diverse images, the other a field test of 223 user accou...
متن کاملGraphical Password Authentication Using Persuasive Cued Click-Points Mechanism
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use pe...
متن کاملUser Authentication Based On Persuasive Cued Click Points with Sound Signature
Various graphical password schemes have been proposed as alternatives to text-based passwords. Researches have shown that text-based passwords are fraught with both usability and security problems that make them less than desirable solution. Psychology studies have revealed that the human brain is better at recognizing and recalling images than text. Graphical passwords are intended to capitali...
متن کاملHuman-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords
Although motivated by both usability and security concerns, the existing literature on click-based graphical password schemes using a single background image (e.g., PassPoints) has focused largely on usability. We examine the security of such schemes, including the impact of different background images, and strategies for guessing user passwords. We report on both shortand long-term user studie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2011