Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords

نویسندگان

  • Julie Thorpe
  • Paul C. van Oorschot
چکیده

Although motivated by both usability and security concerns, the existing literature on click-based graphical password schemes using a single background image (e.g., PassPoints) has focused largely on usability. We examine the security of such schemes, including the impact of different background images, and strategies for guessing user passwords. We report on both shortand long-term user studies: one lab-controlled, involving 43 users and 17 diverse images, and the other a field test of 223 user accounts. We provide empirical evidence that popular points (hot-spots) do exist for many images, and explore two different types of attack to exploit this hotspotting: (1) a “human-seeded” attack based on harvesting click-points from a small set of users, and (2) an entirely automated attack based on image processing techniques. Our most effective attacks are generated by harvesting password data from a small set of users to attack other targets. These attacks can guess 36% of user passwords within 2 guesses (or 12% within 2 guesses) in one instance, and 20% within 2 guesses (or 10% within 2 guesses) in a second instance. We perform an image-processing attack by implementing and adapting a bottom-up model of visual attention, resulting in a purely automated tool that can guess up to 30% of user passwords in 2 guesses for some instances, but under 3% on others. Our results suggest that these graphical password schemes appear to be at least as susceptible to offline attack as the traditional text passwords they were proposed to replace.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Predicting and Exploiting Hot-Spots in Click-Based Graphical Passwords∗

We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both shortand long-term user studies: one labcontrolled, involving 43 users and 17 diverse images, the other a field test of 223 user accou...

متن کامل

Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords1

Although motivated by both usability and security concerns, the existing literature on click-based graphical password schemes using a single background image (e.g., PassPoints) has focused largely on usability. We examine the security of such schemes, including the impact of different background images, and strategies for guessing user passwords. We report on both shortand long-term user studie...

متن کامل

Exploiting predictability in click-based graphical passwords

We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both shortand long-term user studies: one labcontrolled, involving 43 users and 17 diverse images, the other a field test of 223 user accou...

متن کامل

User-Choice Patterns in PassTiles Graphical Passwords

Graphical passwords are an alternative to text passwords, with advantages to both usability and security. We investigate PassTiles, a research graphical password system, and look specifically at user-chosen PassTiles passwords. We examine whether having a blank background or a background image affects patterns and hot-spots. We found reduced entropy in both conditions due to patterns, which wea...

متن کامل

TwoStep: An Authentication Method Combining Text and Graphical Passwords

Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based graphical password schemes alone, in order to offer sufficient security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user authentication approach combining text password...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007