skip to main content
10.1145/3027063.3053217acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

Influences of Users' Cognitive Strategies on Graphical Password Composition

Published:06 May 2017Publication History

ABSTRACT

Recent research reveals interaction effects among human cognitive processing factors, interaction device types and user authentication schemes towards security of user created graphical keys. Aiming to investigate how different visual behaviors of individuals with varying cognitive strategies affect the security aspects of graphical user authentication (GUA) across device types, this paper reports preliminary results of a user study (N=51) on graphical password composition using a recognition-based GUA scheme. Results reveal differences on key strength and complexity, as well as on gaze-based entropies between users with different cognitive strategies, which can be used for the design of user-adaptive GUA schemes.

References

  1. Charoula Angeli, Nicos Valanides, and Paul Kirschner. 2009. Field dependence--independence and instructional-design effects on learners' performance with a computer-modeling tool. Computers in Human Behavior 25, 6: 1355--1366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Marios Belk, Christos Fidas, Panagiotis Germanakos, and George Samaras. 2013. Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms. In 442--459.Google ScholarGoogle Scholar
  3. Marios Belk, Christos Fidas, Panagiotis Germanakos, and George Samaras. 2015. A Personalized User Authentication Approach Based on Individual Differences in Information Processing. Interacting with Computers 27, 6: 706--723. Google ScholarGoogle ScholarCross RefCross Ref
  4. Robert Biddle, Sonia Chiasson, and P.C. Van Oorschot. 2012. Graphical passwords. ACM Computing Surveys 44, 4: 1--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Sacha Brostoff and M Angela Sasse. 2000. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In People and Computers XIV -- Usability or Else!. Springer London, London, 405-- 424.Google ScholarGoogle ScholarCross RefCross Ref
  6. Sonia Chiasson, Alain Forget, Elizabeth Stobert, P. C. van Oorschot, and Robert Biddle. 2009. Multiple password interference in text passwords and clickbased graphical passwords. Proceedings of the 16th ACM conference on Computer and communications security - CCS '09, ACM Press, 500.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Darren Davis, Fabian Monrose, and Michael K Reiter. 2004. On User Choice in Graphical Password Schemes. In 13th USENIX Security Symposium.Google ScholarGoogle Scholar
  8. Rachna Dhamija and Adrian Perrig. 2000. Deja VuA User Study: Using Images for Authentication. USENIX Security Symposium, 4.Google ScholarGoogle Scholar
  9. Kerstin Gidlöf, Annika Wallin, Richard Dewhurst, and Kenneth Holmqvist. 2013. Using Eye Tracking to Trace a Cognitive Process: Gaze Behaviour During Decision Making in a Natural Environment. Journal of Eye Movement Research 6, 1.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. Herley and P. Van Oorschot. 2012. A Research Agenda Acknowledging the Persistence of Passwords. IEEE Security & Privacy Magazine 10, 1: 28--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jon-Chao Hong, Ming-Yueh Hwang, Ker-Ping Tam, Yi-Hsuan Lai, and Li-Chun Liu. 2012. Effects of cognitive style on digital jigsaw puzzle performance: A GridWare analysis. Computers in Human Behavior 28, 3: 920--928. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Saranga Komanduri, Richard Shay, Patrick Gage Kelley, et al. 2011. Of passwords and people. Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11, ACM Press, 2595. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dachuan Liu, Bo Dong, Xing Gao, and Haining Wang. 2015. Exploiting Eye Tracking for Smartphone Authentication. In Lecture Notes in Computer Science (LNCS). 457--477. Google ScholarGoogle ScholarCross RefCross Ref
  14. Yao Ma, Jinjuan Feng, Libby Kumin, and Jonathan Lazar. 2013. Investigating User Behavior for Authentication Methods. ACM Transactions on Accessible Computing 4, 4: 1--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Martin Mihajlov and Borka Jerman-Blazic. 2011. On designing usable and secure recognition-based graphical authentication mechanisms. Interacting with Computers 23, 6: 582--593. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. James Nicholson, Lynne Coventry, and Pam Briggs. 2013. Age-related performance issues for PIN and face-based authentication systems. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13, ACM Press, 323. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. L. O'Gorman. 2003. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91, 12: 2021--2040. Google ScholarGoogle ScholarCross RefCross Ref
  18. Philip K Oltman, Evelyn Raskin, and Herman A Witkin. 1971. Group embedded figures test. Consulting Psychologists Press Palo Alto, CA.Google ScholarGoogle Scholar
  19. George E Raptis, Christos A Fidas, and Nikolaos M Avouris. 2016. Using Eye Tracking to Identify Cognitive Differences: A Brief Literature Review. 20th Pan-Hellenic Conference in Informatics, 21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kent A. Rittschof. 2010. Field dependence-- independence as visuospatial and executive functioning in working memory: implications for instructional systems design and research. Educational Technology Research and Development 58, 1: 99--114. Google ScholarGoogle ScholarCross RefCross Ref
  21. Aviel D Rubin, Ian Jermyn, Alain Mayer, Fabian Monrose, and Michael K Reiter. 1999. The design and analysis of graphical passwords. 8th USENIX Security Symposium.Google ScholarGoogle Scholar
  22. Chen Sun, Yang Wang, and Jun Zheng. 2014. Dissecting pattern unlock: The effect of pattern strength meter on pattern selection. Journal of Information Security and Applications 19, 4--5: 308--320.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hai Tao and Carlisle Adams. 2008. Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. IJ Network Security 7, 2: 273--292.Google ScholarGoogle Scholar
  24. Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir Memon. 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, 1--2: 102--127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. H. A. Witkin, C. A. Moore, D. R. Goodenough, and P. W. Cox. 1975. Field-Dependent and FieldIndependent Cognitive Styles and Their Educational Implications. ETS Research Bulletin Series 1975, 2: 1--64. Google ScholarGoogle ScholarCross RefCross Ref
  26. Emanuel von Zezschwitz, Alexander De Luca, and Heinrich Hussmann. 2014. Honey, I shrunk the keys. Proceedings of the 8th Nordic Conference on Human-Computer Interaction Fun, Fast, Foundational - NordiCHI '14, ACM Press, 461--470.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Windows 10 sign in options. Retrieved January 11, 2017 from http://www.thewindowsclub.com/windows-10-signoptions.Google ScholarGoogle Scholar
  28. Tobii Pro Glasses 2. Retrieved January 8, 2017 from http://www.tobiipro.com/product-listing/tobiipro-glasses-2/.Google ScholarGoogle Scholar

Index Terms

  1. Influences of Users' Cognitive Strategies on Graphical Password Composition

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '17: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems
      May 2017
      3954 pages
      ISBN:9781450346566
      DOI:10.1145/3027063

      Copyright © 2017 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 May 2017

      Check for updates

      Qualifiers

      • abstract

      Acceptance Rates

      CHI EA '17 Paper Acceptance Rate1,000of5,000submissions,20%Overall Acceptance Rate6,164of23,696submissions,26%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader