Undercover: authentication usable in front of prying eyes

A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design, implementation, and evaluation of a novel class of user authentication systems that are resilient to observation attacks. Our proposal is the first to rely on the human ability to simultaneously process multiple sensory inputs to authenticate, and is resilient to most observation attacks. We build a prototype based on user feedback gained through low fidelity tests. We conduct a within-subjects usability study of the prototype with 38 participants, which we complement with a security analysis. Our results show that users can authenticate within times comparable to that of graphical password schemes, with relatively low error rates, while being considerably better protected against observation attacks. Our design and evaluation process allows us to outline design principles for observation-resilient authentication systems.

[1]  David A. Wagner,et al.  Cryptanalysis of a Cognitive Authentication Scheme , 2006, IACR Cryptol. ePrint Arch..

[2]  Hans Colonius,et al.  Visual-tactile spatial interaction in saccade generation , 2003, Experimental Brain Research.

[3]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[4]  Dawei Hong,et al.  A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.

[5]  Fiona Fui-Hoon Nah,et al.  Web browsing and spyware intrusion , 2005, CACM.

[6]  Nicolas Christin,et al.  Mental Trapdoors for User Authentication on Small Mobile Devices , 2007 .

[7]  Ehud Ahissar,et al.  Importance of Temporal Cues for Tactile Spatial- Frequency Discrimination , 2001, The Journal of Neuroscience.

[8]  Feng Zhou,et al.  Keyboard acoustic emanations revisited , 2005, CCS '05.

[9]  C. Spence,et al.  The Handbook of Multisensory Processing , 2004 .

[10]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[11]  Volker Roth,et al.  A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.

[12]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[13]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[14]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[15]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.

[16]  B. Malek,et al.  Novel Shoulder-Surfing Resistant Haptic-based Graphical Password , 2006 .

[17]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[18]  David A. Wagner,et al.  Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[19]  Simson L. Garfinkel,et al.  Security and Usability , 2005 .

[20]  T. Salthouse The processing-speed theory of adult age differences in cognition. , 1996, Psychological review.

[21]  P J Blamey,et al.  Speech perception using combinations of auditory, visual, and tactile information. , 1989, Journal of rehabilitation research and development.

[22]  Lorrie Faith Cranor,et al.  Security and Usability: Designing Secure Systems that People Can Use , 2005 .

[23]  Tal Garfinkel,et al.  Reducing shoulder-surfing by using gaze-based password entry , 2007, SOUPS '07.

[24]  Daphna Weinshall,et al.  Cognitive authentication schemes safe against spyware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[25]  Wendy Moncur,et al.  Pictures at the ATM: exploring the usability of multiple graphical passwords , 2007, CHI.