Protecting the login session from camera based shoulder surfing attacks
نویسنده
چکیده
...................................................................................................................................................... viii 1. Chapter 1 Problem Statement................................................................................................................1 2. Chapter 2 Background and Related Work.............................................................................................3 2.1 Traditional Passwords ..................................................................................................................3 2.2 Graphical Passwords ....................................................................................................................6 2.3 Graphical Password Examples .....................................................................................................9 2.3.1 Pure recall systems .................................................................................................................9 2.3.2 Cued recall systems...............................................................................................................13 2.3.3 Recognition based systems....................................................................................................18 2.3.4 Graphical Password Classifications.......................................................................................24 2.3.5 Biometrics .............................................................................................................................25 3. Chapter 3 Establishing the Security Context for Graphical Passwords...............................................27 3.1 Graphical Password Attack Vectors – Establishing the Shoulder Surfing Threat......................27 3.2 Defense Mechanisms – Shoulder Surfing ..................................................................................30 3.3 Goals for Login Mechanisms – Ideal vs. Practical .....................................................................37 3.4 Establishing Metrics – Quantifying the Shoulder Surfing Defense............................................39 4. Chapter 4 Initial Project ......................................................................................................................40 4.1 Design ........................................................................................................................................40 4.2 Implementation ..........................................................................................................................41 4.3 Results & Analysis .....................................................................................................................42 5. Chapter 5 Research Project .................................................................................................................44 5.1 Design and Incorporation of Contrast Inversion Approach........................................................44 5.1 Design Goals and Context..........................................................................................................47 6. Chapter 6 Experiment Methodology...................................................................................................49 6.1 Technology Study ......................................................................................................................50 6.1.1 Objective ...............................................................................................................................50 6.1.2 Format ...................................................................................................................................50 6.2 User Study..................................................................................................................................52 6.2.1 Objective ...............................................................................................................................52 6.2.2 Format ...................................................................................................................................52 7. Chapter 7 Results ................................................................................................................................53 7.1 Technology Study ......................................................................................................................53 7.1.1 Mobile Phone: Sony Ericsson Z525a ....................................................................................53 7.1.2 Mobile Phone: Sony Ericsson W580i....................................................................................55 7.1.3 Point and Shoot Camera: Canon A610..................................................................................56 7.1.4 ‘Prosumer’ Point and Shoot Camera: Kodak Z812IS............................................................58
منابع مشابه
Intelligent Techniques with GUI by Challenge Keypad for Secure Password
In general, all the keypad based authentication system having several possibilities of password guessing by means of shoulder movements. Shoulder-surfing is an attack on password authentication that has traditionally been hard to defeat. This problem has come up with a new solution. Devising a user authentication scheme based on personal identification numbers (PINs) that is both secure and pra...
متن کاملReview on Color Password to Resist Shoulder Surfing Attack
Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, both the text-based password schemes and graphical password schemes are not se...
متن کاملQ-A: Towards the Solution of Usability-Security Tension in User Authentication
Users often choose passwords that are easy to remember but also easy to guess by attackers. Recent studies have revealed the vulnerability of textual passwords to shoulder surfing and keystroke loggers. It remains a critical challenge in password research to develop an authentication scheme that addresses these security issues, in addition to offering good memorability. Motivated by psychology ...
متن کاملAuthentication Scheme for Session Passwords Using Color and Image
Graphical passwords are believed to be more secure than traditional textual passwords, but the authentications are usually complex and boring for users. Furthermore, most of the existing graphical password schemes are vulnerable to spyware and shoulder surfing. A novel graphical password scheme ColorLogin is proposed in this paper. ColorLogin is implemented in an interesting game way to weaken ...
متن کاملAuthentication Mechanisim For Session Passwords By Imposing Color With Text
The most common method used for authentication is Textual passwords. But textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are helpless to shoulder surfing. To address this problem, text can be combined with images or colors ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008