Usable Authentication Research with the MVP Framework Robert Biddle Carleton University, Ottawa http://hotsoft.carleton.ca Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Nick Wright, Bruna Machado Freitas, Alain Forget, Andrew Patrick Biddle: MVP 1
37
Embed
Usable Authentication Research with the MVP Framework Robert Biddle Carleton University, Ottawa Sonia Chiasson, Chris Deschamps,
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Usable Authentication Research with the MVP Framework
Robert BiddleCarleton University, Ottawahttp://hotsoft.carleton.ca
Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Nick Wright, Bruna Machado Freitas, Alain Forget,
Andrew Patrick
Biddle: MVP 1
Agenda
• Usable Security and Authentication• MVP Framework• MVP Authentication Schemes• MVP Management• MVP Recent Research Results• Dalhousie Action Items
• References:– Graphical Passwords: Learning from first 12 years– The MVP Framework Web-Based Framework– http://hotsoft.carleton.ca/~sonia/wordpress/publications/
Biddle: MVP 2
Usable Security• Saltzer and Schroeder, 1975:
“It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly. Also, to the extent that the user’s mental image of his protection goals matches the mechanisms he must use, mistakes will be minimized. If he must translate his image of his protection needs into a radically different specification language, he will make errors.”
• Cranor and Garfinkel, 2005:
“secure systems that people can use.”
Biddle 3
Usable Security Challenges
• Security is a Secondary Task– Avoided or evaded if inconvenient
• Security has the “Barn Door” Property– Brief exposure can cause permanent damage
• Security has a complex language– Encryption, public/private keys, phishing, …
• Security is poorly understood by users– Users do not understand consequences of
insecure actions, assume they are not at risk, underestimate attackers’ abilities
Biddle 4
Research Methods
• Human Factors Principles• Usability Evaluation Methods• Experiment and Field Study Design• Ethical Procedures for Human
Participants• Quantitative Analysis and Statistical
Inference• Qualitative Study and Data Analysis• Reporting Results, Graphical Data
Presentation
Biddle 5
Authentication and Credentials
rosebud
6Biddle
Threats to PasswordsThreats to Passwords
• Guessing– Online (Web-Robots) or Offline (Access to DB) – Single-User (Targeted) of Multi-User (Any User) – Exhaustive or Dictionary
• Capture– Shoulder-Surfing (by eye or by video)– Social Engineering (incl. phishing)– Malware (keyloggers etc.)
Biddle 7
The Password Problem
• Passwords should be:–Easy to Remember, but–Difficult to Guess
• For multiple passwords!• Sometimes with rules!• Different rules for each password!• And compulsory regular changes!
Biddle: MVP 8
Theoretical Password Space
• The number of possible passwords that a scheme allows.
• Therefore, the number of passwords an attacker must guess to ensure success.
• Therefore, an expected value function for each attacker guess.
• IF all passwords are equally likely.
Biddle: MVP 9
Theoretical Password Space: E.g.PassPoints Password Space
Biddle: MVP 10
Effective Password Space
• The number of passwords people are likely to actually choose.
• But it’s not one space: it’s a curve. So…
Matt Weir: reusablesec.blogspot.comBiddle: MVP 11
MVP: Multiple Versatile Passwords
• Framework for Empirical Research on Usable Knowledge-Based Authentication
• Basic idea: allow new kinds of password schemes within an ecologically valid setting
• Real sites, real usage• Passwords used in context, secondary task
Biddle: MVP 12
• Site password input redirects to MVP • MVP selects scheme based on userid• Scheme runs, logging all events• Result is rendered as text password to site
Biddle: MVP 13
MVP in Use
• Button instead of “Enter Password” field• Pop-up Window with selected Scheme
Biddle: MVP 14
MVP Schemes: Text
• Pure user-chosen text• User-chosen text with rules– Length, required chars, denied chars, etc.
• Assigned random text– Length, alphabet
• Multiple word text– Number of words, chosen or assigned, lists
Biddle: MVP 15
MVP Schemes: Recognition
• Like PassFaces– Number of panels– Images per panel– Image sets• Faces• Houses• Objects
Biddle: MVP 16
MVP Schemes: Graphical Recall
• Like Draw-a-Secret– Grid size
Biddle: MVP 17
MVP Schemes: Click-Based
• Passpoints– 5 Points on Image– Tolerance areas– Can vary:• Number of Clicks• Image Sets
Biddle: MVP 18
MVP Schemes: Click Based
• Cued-Click Points– Like Passpoints, but 1-click per image– Each click selects next image– Number of images parameter
Biddle: MVP 19
MVP Schemes: Click Based
• Persuasive Cued Click Points– Like CCP, but with random viewport
Biddle: MVP 20
MVP Schemes: Other
• 2nd gen DAS, PP, CCP, PCCP, Recognition• Text Recognition• PassTiles Family• GridSure• CYOA
• More???
Biddle: MVP 21
MVP Website Engine Plugins
• Wordpress – Blog Engine with many other plugins, e.g. voting,
MVP Log• Time: Timestamp to 1 second• System: Name of website• User: Username• Scheme: Scheme• Condition: subscheme• Mode: create, enter, login• Event: specific to mode• Data: specific to event