On Predicting and Exploiting Hot-Spots in Click-Based Graphical Passwords∗
نویسندگان
چکیده
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both shortand long-term user studies: one labcontrolled, involving 43 users and 17 diverse images, the other a field test of 223 user accounts. We provide empirical evidence that hot-spots do exist for many images, some more so than others. We explore the use of “human-computation” (in this context, harvesting click-points from a small set of users) to predict these hot-spots. We generate two “human-seeded” attacks based on this method: one based on a first-order Markov model, another based on an independent probability model. Within 100 guesses, our first-order Markov model-based attack guesses 4% of passwords in one instance, and 10% of passwords in a second instance. Our independent model-based attack guesses 20% within 2 guesses in one instance and 36% within 2 guesses in a second instance. These are all for a system whose full password space has cardinality 2. We also evaluate our first-order Markov model-based attack with cross-validation of the field study data, finding that it guesses an average of 7-10% of user passwords within 3 guesses. Our results suggest that these graphical password schemes (as originally proposed) are vulnerable to offline and online attacks, even on systems that implement conservative lock-out policies.
منابع مشابه
Exploiting predictability in click-based graphical passwords
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We report on both shortand long-term user studies: one labcontrolled, involving 43 users and 17 diverse images, the other a field test of 223 user accou...
متن کاملHuman-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords
Although motivated by both usability and security concerns, the existing literature on click-based graphical password schemes using a single background image (e.g., PassPoints) has focused largely on usability. We examine the security of such schemes, including the impact of different background images, and strategies for guessing user passwords. We report on both shortand long-term user studie...
متن کاملHuman-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords1
Although motivated by both usability and security concerns, the existing literature on click-based graphical password schemes using a single background image (e.g., PassPoints) has focused largely on usability. We examine the security of such schemes, including the impact of different background images, and strategies for guessing user passwords. We report on both shortand long-term user studie...
متن کاملUser-Choice Patterns in PassTiles Graphical Passwords
Graphical passwords are an alternative to text passwords, with advantages to both usability and security. We investigate PassTiles, a research graphical password system, and look specifically at user-chosen PassTiles passwords. We examine whether having a blank background or a background image affects patterns and hot-spots. We found reduced entropy in both conditions due to patterns, which wea...
متن کاملHelping Users Protect Themselves from e-Criminals in Click-Based Graphical Passwords
Click-based graphical passwords, like other user-selected passwords, suffer from predictability problems. With click-based graphical passwords, user click-points form hotspots, areas of the image that are more likely to be selected, which e-criminals can predict and use to launch dictionary attacks. Our system, Persuasive Cued Click-Points, helps users select more random click-points and reduce...
متن کامل