Home > Research > Publications & Outputs > Security analyses of click-based graphical pass...

Links

Text available via DOI:

View graph of relations

Security analyses of click-based graphical passwords via image point memorability

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Security analyses of click-based graphical passwords via image point memorability. / Zhu, Bin B.; Yan, Jeff; Yang, Maowei et al.
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014. p. 1217-1231.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Zhu, BB, Yan, J, Yang, M & Wei, D 2014, Security analyses of click-based graphical passwords via image point memorability. in CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, pp. 1217-1231, 21st ACM Conference on Computer and Communications Security, CCS 2014, Scottsdale, United States, 3/11/14. https://doi.org/10.1145/2660267.2660364

APA

Zhu, B. B., Yan, J., Yang, M., & Wei, D. (2014). Security analyses of click-based graphical passwords via image point memorability. In CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 1217-1231). ACM. https://doi.org/10.1145/2660267.2660364

Vancouver

Zhu BB, Yan J, Yang M, Wei D. Security analyses of click-based graphical passwords via image point memorability. In CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. 2014. p. 1217-1231 doi: 10.1145/2660267.2660364

Author

Zhu, Bin B. ; Yan, Jeff ; Yang, Maowei et al. / Security analyses of click-based graphical passwords via image point memorability. CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York : ACM, 2014. pp. 1217-1231

Bibtex

@inproceedings{4adc21d2c95f4451872abee0b6192b2a,
title = "Security analyses of click-based graphical passwords via image point memorability",
abstract = "We propose a novel concept and a model of image point memorability (IPM) for analyzing click-based graphical passwords that have been studied extensively in both the security and HCI communities. In our model, each point in an image is associated with a numeric index that indicates the point's memorability level. This index can be approximated either by automatic computer vision algorithms or via human assistance. Using our model, we can rank-order image points by their relative memorability with a decent accuracy. We show that the IPM model has both defensive and offensive applications. On the one hand, we apply the model to generate high-quality graphical honeywords. This is the first work on honeywords for graphical passwords, whereas all previous methods are only for generating text honeywords and thus inapplicable. On the other hand, we use the IPM model to develop the first successful dictionary attacks on Persuasive Cued Click Points (PCCP), which is the state-of-the-art click-based graphical password scheme and robust to all prior dictionary attacks. We show that the probability distribution of PCCP passwords is seriously biased when it is examined with the lens of the IPM model. Although PCCP was designed to generate random passwords, its effective password space as we measured can be as small as 30.58 bits, which is substantially weaker than its theoretical and commonly believed strength (43 bits). The IPM model is applicable to all click-based graphical password schemes, and our analyses can be extended to other graphical passwords as well.",
keywords = "Authentication, Dictionary attacks, Graphical honeywords, Image point memorability",
author = "Zhu, {Bin B.} and Jeff Yan and Maowei Yang and Dongchen Wei",
year = "2014",
month = nov,
day = "3",
doi = "10.1145/2660267.2660364",
language = "English",
isbn = "9781450329576",
pages = "1217--1231",
booktitle = "CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security",
publisher = "ACM",
note = "21st ACM Conference on Computer and Communications Security, CCS 2014 ; Conference date: 03-11-2014 Through 07-11-2014",

}

RIS

TY - GEN

T1 - Security analyses of click-based graphical passwords via image point memorability

AU - Zhu, Bin B.

AU - Yan, Jeff

AU - Yang, Maowei

AU - Wei, Dongchen

PY - 2014/11/3

Y1 - 2014/11/3

N2 - We propose a novel concept and a model of image point memorability (IPM) for analyzing click-based graphical passwords that have been studied extensively in both the security and HCI communities. In our model, each point in an image is associated with a numeric index that indicates the point's memorability level. This index can be approximated either by automatic computer vision algorithms or via human assistance. Using our model, we can rank-order image points by their relative memorability with a decent accuracy. We show that the IPM model has both defensive and offensive applications. On the one hand, we apply the model to generate high-quality graphical honeywords. This is the first work on honeywords for graphical passwords, whereas all previous methods are only for generating text honeywords and thus inapplicable. On the other hand, we use the IPM model to develop the first successful dictionary attacks on Persuasive Cued Click Points (PCCP), which is the state-of-the-art click-based graphical password scheme and robust to all prior dictionary attacks. We show that the probability distribution of PCCP passwords is seriously biased when it is examined with the lens of the IPM model. Although PCCP was designed to generate random passwords, its effective password space as we measured can be as small as 30.58 bits, which is substantially weaker than its theoretical and commonly believed strength (43 bits). The IPM model is applicable to all click-based graphical password schemes, and our analyses can be extended to other graphical passwords as well.

AB - We propose a novel concept and a model of image point memorability (IPM) for analyzing click-based graphical passwords that have been studied extensively in both the security and HCI communities. In our model, each point in an image is associated with a numeric index that indicates the point's memorability level. This index can be approximated either by automatic computer vision algorithms or via human assistance. Using our model, we can rank-order image points by their relative memorability with a decent accuracy. We show that the IPM model has both defensive and offensive applications. On the one hand, we apply the model to generate high-quality graphical honeywords. This is the first work on honeywords for graphical passwords, whereas all previous methods are only for generating text honeywords and thus inapplicable. On the other hand, we use the IPM model to develop the first successful dictionary attacks on Persuasive Cued Click Points (PCCP), which is the state-of-the-art click-based graphical password scheme and robust to all prior dictionary attacks. We show that the probability distribution of PCCP passwords is seriously biased when it is examined with the lens of the IPM model. Although PCCP was designed to generate random passwords, its effective password space as we measured can be as small as 30.58 bits, which is substantially weaker than its theoretical and commonly believed strength (43 bits). The IPM model is applicable to all click-based graphical password schemes, and our analyses can be extended to other graphical passwords as well.

KW - Authentication

KW - Dictionary attacks

KW - Graphical honeywords

KW - Image point memorability

U2 - 10.1145/2660267.2660364

DO - 10.1145/2660267.2660364

M3 - Conference contribution/Paper

AN - SCOPUS:84910667281

SN - 9781450329576

SP - 1217

EP - 1231

BT - CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security

PB - ACM

CY - New York

T2 - 21st ACM Conference on Computer and Communications Security, CCS 2014

Y2 - 3 November 2014 through 7 November 2014

ER -