Home > Research > Publications & Outputs > "Your Eyes Tell You Have Used This Password Bef...

Links

Text available via DOI:

View graph of relations

"Your Eyes Tell You Have Used This Password Before": Identifying Password Reuse from Gaze and Keystroke Dynamics.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Close
Publication date29/04/2022
Host publicationCHI 2022 - Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems
PublisherAssociation for Computing Machinery (ACM)
Pages1-16
Number of pages16
ISBN (electronic)9781450391573
<mark>Original language</mark>English
EventCHI '22: 2022 CHI Conference on Human Factors in Computing Systems - New Orleans, United States
Duration: 29/04/20225/05/2022
https://chi2022.acm.org/

Conference

ConferenceCHI '22: 2022 CHI Conference on Human Factors in Computing Systems
Country/TerritoryUnited States
CityNew Orleans
Period29/04/225/05/22
Internet address

Publication series

NameConference on Human Factors in Computing Systems - Proceedings

Conference

ConferenceCHI '22: 2022 CHI Conference on Human Factors in Computing Systems
Country/TerritoryUnited States
CityNew Orleans
Period29/04/225/05/22
Internet address

Abstract

A significant drawback of text passwords for end-user authentication is password reuse. We propose a novel approach to detect password reuse by leveraging gaze as well as typing behavior and study its accuracy. We collected gaze and typing behavior from 49 users while creating accounts for 1) a webmail client and 2) a news website. While most participants came up with a new password, 32% reported having reused an old password when setting up their accounts. We then compared different ML models to detect password reuse from the collected data. Our models achieve an accuracy of up to 87.7% in detecting password reuse from gaze, 75.8% accuracy from typing, and 88.75% when considering both types of behavior. We demonstrate that using gaze, password reuse can already be detected during the registration process, before users entered their password. Our work paves the road for developing novel interventions to prevent password reuse.