skip to main content
10.1145/2207676.2208545acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

WebTicket: account management using printable tokens

Authors Info & Claims
Published:05 May 2012Publication History

ABSTRACT

Passwords are the most common authentication scheme today. However, it is difficult for people to memorize strong passwords, such as random sequences of characters. Additionally, passwords do not provide protection against phishing attacks. This paper introduces WebTicket, a low cost, easy-to-use and reliable web account management system that uses "tickets", which are tokens that contain a two-dimensional barcode that can be printed or stored on smartphones. Users can log into accounts by presenting the barcodes to webcams connected to computers. Through two lab studies and one field study consisting of 59 participants in total, we found that WebTicket can provide reliable authentication and phishing resilience.

References

  1. eToken. http://www.aladdin.com/etoken/.Google ScholarGoogle Scholar
  2. QRCode.com. http://www.denso-wave.com/qrcode/.Google ScholarGoogle Scholar
  3. RSA securID http://www.rsa.com/node.aspx?id=1156.Google ScholarGoogle Scholar
  4. A. Adams and M. Sasse. Users are not the enemy. Communications of the ACM (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Brostoff and M. Sasse. Are passfaces more usable than passwords: A field trial investigation. In Proc. of HCI 2000, (2000).Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Chiasson, R. Biddle, and P. V. Oorschot. A second look at the usability of click-based graphical passwords. In Proc. of SOUPS (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Dhamija and J. Tygar. The battle against phishing: Dynamic security skins. In Proc. of SOUPS (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Dirik, N. Memon, and J. C. Birget. Modeling user choice in the passpoints graphical password scheme. In Proc. of SOUPS (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Egelman, L. F. Cranor, J. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proc. of SIGCHI (2008) Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Everitt, T. Bragin, J. Fogarty, and T. Kohno. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In Proc. of CHI (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gartner. Automated password resets can cut it service desk costs. 2004.Google ScholarGoogle Scholar
  12. S. Gaw and E. Felten. Password management strate-gies for online accounts. In Proc. of SOUPS (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. T. Hallinan. Why We Make Mistakes. Broadway, 2009.Google ScholarGoogle Scholar
  14. E. Hayashi, R. Dhamija, N. Christin, and A. Perrig. Use your illusion: secure authentication usable anywhere. In Proc. of SOUPS (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. Hayashi, J. I. Hong, A Diary Study of Password Usage in Daily Life. In Proc. of SIGCHI (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. V. Klein. "foiling the cracker": A survey of, and improvements to, password security. In Proc. of USENIX Security, (1990).Google ScholarGoogle Scholar
  17. S. Klemmer, M. Newman, and R. Farrell. The designers' outpost: a tangible interface for collaborative web site. In Proc. of UIST (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Kuo, S. Romanosky, and L. Cranor. Human selection of mnemonic phrase-based passwords. In Proc. of SOUPS (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. L. Learning 10,000 pictures. Quarterly Journal of Experimental Psychology, (1967).Google ScholarGoogle Scholar
  20. W. MacKay. Is paper safer? The role of paper flight strips in air traffic control. ACM Transactions on Computer-Human Interaction, (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. McCune, A. Perrig, and M. Reiter. Seeing-isbelieving: Using camera phones for human-verifiable authentication. In IEEE S&P (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. McGee, P. Cohen, R. Wesson, and S. Horman. Comparing paper and tangible, multimodal tools. In Proc. of CHI (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. T. Moran, E. Saund, W. V. Melle, A. Gujar, K. Fishkin, and B. Harrison. Design and technology for collaborage: collaborative collages of information on physical walls. In Proc. of UIST (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. L. Nelson, S. Ichimura, E. Pedersen, and L. Adams. Palette: a paper interface for giving presentations. In Proc. of CHI (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Paivio and T. Rogers. Why are pictures easier to recall than words? Psychonomic Science, (1968).Google ScholarGoogle ScholarCross RefCross Ref
  26. B. Parno, C. Cuo and A. Perrig, PhoolprofPhishing Prevention. In Proc of. the Financial Cryptography and data security (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In Proc. of the USENIX Security(2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Sasse, S. Brostoff, and D. Weirich. Transforming the 'weakest link' a human/computer interaction approach to usable and effective security. BT technology journal, (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Whitten and J. Tygar. Why johnny can't encrypt. In USENIX Security, (1999).Google ScholarGoogle Scholar
  30. S. Wiedenbeck, J. Waters, J. Birget, and A. Brodskiy. Passpoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. In IEEE Security & privacy, Vol. 2, pp. 25--31, (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. K. Yee, K. Sitaker. Passpet: convenient password management and phishing protection. In Proc. of SOUPS (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Your Top 20 most frequently used passwords. http://www.tomshardware.com/news/imperva-rockyoumost-common-passwords,9486.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. WebTicket: account management using printable tokens

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      May 2012
      3276 pages
      ISBN:9781450310154
      DOI:10.1145/2207676

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 May 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader