skip to main content
10.1145/1968613.1968647acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A new shoulder-surfing resistant password for mobile environments

Authors Info & Claims
Published:21 February 2011Publication History

ABSTRACT

In mobile devices such as smart phones, it is important to provide adequate user authentication. Conventional text-based passwords have significant drawbacks though they are used as the most common authentication method. To address the vulnerabilities of traditional text-based passwords, graphical password schemes have been developed as possible alternative solutions. However, a potential drawback of graphical password schemes is that they are more vulnerable to shoulder-surfing than conventional text-based passwords. In this paper, we present a new shoulder-surfing resistant password. Our approach makes it difficult for attackers to observe a user's password by requiring the user to locate his or her password in the given password grid instead of entering the password (Figure 1). Security analysis for shoulder-surfing attacks shows that our password is robust against both random and shoulder-surfing attacks.

References

  1. Gridsure website. http://www.gridsure.com, Last accessed August 2010.Google ScholarGoogle Scholar
  2. Science behind passfaces. http://www.passfaces.com/enterprise/resources/white_papers.htm, accessed August 2010.Google ScholarGoogle Scholar
  3. Y. Berger, A. Wool, and A. Yeredor. Dictionaly attacks using keyboard acoustic emanations. In Proc. of the 13th ACM Conf. on Computer and Communications Security, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Dunphy and J. Yan. Do background images improve 'draw a secret' graphical passwords? In Proc. of the 14th ACM Conf. on Computer and Communications Security, pages 36--47, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. M. Everitt, T. Bragin, J. Fogarty, and T. Kohno. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In Proc. of the 27th Int. Conf. on Human factors in computing systems, pages 889--898, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Hoanca and K. Mock. Screen orientaed technique for reducing the incidence of shoulder surfing. In Proc. of the Int. Conf. on Security and Management 2005, pages 334--340, 2005.Google ScholarGoogle Scholar
  7. W. Jansen. Authenticating mobile device users through image selection. In Data Security, 2004.Google ScholarGoogle Scholar
  8. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphica passwords. In Proc. of the 8th USENIX Secrity Symposium, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. G. Kuhn. Electromagnetic evaesdropping risks of flat-panel displays. In Proc. of the 4th Workshop on Privacy Enhancing Technologies, pages 23--25, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Kumar, T. Garfinkel, D. Boneh, and T. Winograd. Reducing shoulder-surfing by using gaze-based password entry. In Proc. of the Symposium On Usable Privacy and Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. H. Lashkari, O. B. Zakaria, S. Farmand, and R. Saleh. Shoulder surfing attack in graphical password authentication. International Journal of Computer Science and Information Security, 6(2):145--154, 2009.Google ScholarGoogle Scholar
  12. T. Perkovic, M. Cagalj, and N. Rakic. Sssl: Shoulder surfing safe login. In Proc. of the 17th Int. Conf. on Software, Telecommunications and Computer Networks, pages 270--275, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. V. Roth, K. Richter, and R. Freidinger. A pin-entry method resilient against shoulder surfing. In Proc. of the 11th ACM Conf. on Computer and Communications Security, pages 236--245, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. X. Suo, Y. Zhu, and G. S. Owen. Graphical passwords: A survey. In Proc. of the 21st Annual Computer Security Applications Conference, pages 463--472, December 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Basic results. In Proc. of the Human-Computer Interaction International, 2005.Google ScholarGoogle Scholar
  16. S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proc. of AVI 2006, pages 177--184, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A new shoulder-surfing resistant password for mobile environments

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICUIMC '11: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
        February 2011
        959 pages
        ISBN:9781450305716
        DOI:10.1145/1968613

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 February 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ICUIMC '11 Paper Acceptance Rate135of534submissions,25%Overall Acceptance Rate251of941submissions,27%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader