Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords
نویسندگان
چکیده
Although motivated by both usability and security concerns, the existing literature on click-based graphical password schemes using a single background image (e.g., PassPoints) has focused largely on usability. We examine the security of such schemes, including the impact of different background images, and strategies for guessing user passwords. We report on both shortand long-term user studies: one lab-controlled, involving 43 users and 17 diverse images, and the other a field test of 223 user accounts. We provide empirical evidence that popular points (hot-spots) do exist for many images, and explore two different types of attack to exploit this hotspotting: (1) a “human-seeded” attack based on harvesting click-points from a small set of users, and (2) an entirely automated attack based on image processing techniques. Our most effective attacks are generated by harvesting password data from a small set of users to attack other targets. These attacks can guess 36% of user passwords within 2 guesses (or 12% within 2 guesses) in one instance, and 20% within 2 guesses (or 10% within 2 guesses) in a second instance. We perform an image-processing attack by implementing and adapting a bottom-up model of visual attention, resulting in a purely automated tool that can guess up to 30% of user passwords in 2 guesses for some instances, but under 3% on others. Our results suggest that these graphical password schemes appear to be at least as susceptible to offline attack as the traditional text passwords they were proposed to replace.
منابع مشابه
On Predicting and Exploiting Hot-Spots in Click-Based Graphical Passwords∗
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both shortand long-term user studies: one labcontrolled, involving 43 users and 17 diverse images, the other a field test of 223 user accou...
متن کاملHuman-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords1
Although motivated by both usability and security concerns, the existing literature on click-based graphical password schemes using a single background image (e.g., PassPoints) has focused largely on usability. We examine the security of such schemes, including the impact of different background images, and strategies for guessing user passwords. We report on both shortand long-term user studie...
متن کاملExploiting predictability in click-based graphical passwords
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both shortand long-term user studies: one labcontrolled, involving 43 users and 17 diverse images, the other a field test of 223 user accou...
متن کاملUser-Choice Patterns in PassTiles Graphical Passwords
Graphical passwords are an alternative to text passwords, with advantages to both usability and security. We investigate PassTiles, a research graphical password system, and look specifically at user-chosen PassTiles passwords. We examine whether having a blank background or a background image affects patterns and hot-spots. We found reduced entropy in both conditions due to patterns, which wea...
متن کاملTwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based graphical password schemes alone, in order to offer sufficient security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user authentication approach combining text password...
متن کامل