Fortifying Android Patterns using Persuasive Security Framework

نویسندگان

  • Hossein Siadati
  • Payas Gupta
  • Sarah Smith
  • Nasir Memon
  • Mustaque Ahamad
چکیده

Android Pattern, form of graphical passwords used on Android smartphones, is widely adopted by users. In theory, Android Pattern is more secure than a 5-digit PIN scheme. Users’ graphical passwords, however, are known to be very skewed. They often include predictable shapes (e.g., Z and N), biases in selection of starting point, and predictable sequences of the points that make them easy to guess. In practice, this decreases the security of Android Pattern to that of a 3-digit PIN scheme for at least half of the users. In this paper, we effectively increase the strength of Android Patterns by using a persuasive security framework, a set of principles to get users to behave more securely. Using these principles, we have designed two user interfaces that persuade users to choose stronger patterns. One of the user interfaces is called BLINK, where the starting point of the pattern is suggested to user, effectively nudging her to create a pattern with a significantly less predictable starting point. The other user interface is called EPSM, where the system gives continuous feedback to user while she is creating a new pattern, effectively persuading her to create a complex pattern. Security and usability of our proposed designs evaluated by conducting a user study on 270 participants recruited from Amazon MTurk demonstrated that while only 49% of subjects choose strong patterns in Android Pattern user interface, our suggested designs increase it to 60% in BLINK and 77% in EPSM version. Keywords–Android; nudging; persuasive security; blinking.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

In contrast to the Android application layer, Android’s application framework’s internals and their influence on the platform security and user privacy are still largely a black box for us. In this paper, we establish a static runtime model of the application framework in order to study its internals and provide the first high-level classification of the framework’s protected resources. We ther...

متن کامل

Google Android: An Updated Security Review

Among the most significant smartphone operating systems that have arisen recently is Google’s Android framework. Google’s Android is a software framework for mobile communication devices. The Android framework includes an operating system, middleware and a set of key applications. Designed as open, programmable, networked devices, Android is vulnerable to various types of threats. This paper pr...

متن کامل

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework

The Android framework utilizes a permission-based security model, which is essentially a variation of the ACL-based access control mechanism. This security model provides controlled access to various system resources. Access control systems are known to be vulnerable to anomalies in security policies, such as inconsistency. In this work, we focus on inconsistent security enforcement within the ...

متن کامل

Android Security Framework: Enabling Generic and Extensible Access Control on Android

We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of codebased security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines...

متن کامل

Google Android: A State-of-the-Art Review of Security Mechanisms

Google’s Android is a comprehensive software framework for mobile communication devices (i.e., smartphones, PDAs). The Android framework includes an operating system, middleware and a set of key applications. The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware. This paper provi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015