A Comparative Usability Study of Two-Factor Authentication Emiliano - - PowerPoint PPT Presentation

a comparative usability study of two factor authentication
SMART_READER_LITE
LIVE PREVIEW

A Comparative Usability Study of Two-Factor Authentication Emiliano - - PowerPoint PPT Presentation

A Comparative Usability Study of Two-Factor Authentication Emiliano de Cristofaro 1 , Honglu Du 2 , Julien Freudiger 2 , Gregory Norcie 3 UCL 1 , PARC 2 , Indiana University 3 Website/Service Token password Fingerprint Phone PIN Retina


slide-1
SLIDE 1

A Comparative Usability Study of Two-Factor Authentication

Emiliano de Cristofaro1, Honglu Du2, Julien Freudiger2, Gregory Norcie3

UCL1, PARC2, Indiana University3

slide-2
SLIDE 2

Website/Service

2

password

Possession Knowledge Inherence

Token Phone Smart Card Fingerprint PIN Pattern Retina Palm

  • A. Adams and M. A. Sasse. Users are not the enemy. 1999
slide-3
SLIDE 3

+

More secure

  • Less usable

Slower Unfamiliar

3

  • N. Gunson et al. User perceptions of security and usability of 1F and 2F in automated telephone banking, 2011
  • D. D. Strouble et al. Productivity and usability effects of using a two-factor security system, 2009
  • C. S. Weir et al. Usable security: User preferences for authentication methods in ebanking and the effects of experience, 2010
slide-4
SLIDE 4

Observations

Large offering of two factor solutions Lack of metrics to measure 2F usability

Problem Problem

Is there a difference in usability among 2F?

Contributions

Comparative usability study Pre-study interview Explorative quantitative study

4

slide-5
SLIDE 5

Goal

Understand popular 2F in use, context and motivations

Participant Recruitment

Mailing lists and social media (Google+ and Facebook) Mailing lists and social media (Google+ and Facebook) Announced paid interviews for user study on authentication Online screening survey to know more about potential participants 9 out of 29 mostly from Silicon Valley, familiar with 2F

5

slide-6
SLIDE 6

Motivation

Forced to Incentivized Wanted to

Adoption

Security token

Context

Work Personal Financial

6

SMS or email Smartphone app

“I use 2F to obtain higher limits on

  • nline banking

transactions” “I use 2F to avoid getting hacked”

slide-7
SLIDE 7

QUANTITATIVE SURVEY

7

“An artisan must first sharpen his tools if he is to do his work well.”

Confucius

slide-8
SLIDE 8

Two main challenges

How to recruit participants?

What questions to ask?

Existing usability metrics

SUS - System Usability Scale (10 questions) QUIS - Questionnaire for User Interface Satisfaction (27 questions) PUEU - Perceived Usefulness and Ease of Use (12 questions) CSUQ - Computer System Usability Questionnaire (19 questions) …

Software focused, not for 2F technologies

8

slide-9
SLIDE 9

Quick Enjoy Helpful Not Enjoy User Friendly Concentration Stressful Convenient

9

Enjoy Reuse Need Instruction Match Frustrating Trust Secure Easy Convenient

  • A. Karole, etc. A comparative usability evaluation of traditional password managers. In ICISC, 2011.
  • J. Bonneau, etc. The quest to replace passwords: a Framework for comparative evaluation of web

authentication schemes. IEEE Symposium on Security and Privacy, 2012.

slide-10
SLIDE 10

Online survey

219 participants from Mechanical Turk SUS and 15 other questions on usability

Group 2F Technologies Used # of Participants

10

Group 2F Technologies Used # of Participants 1 Token 11 2 Email/SMS 77 3 App 7 4 Token & Email/SMS 29 5 Token & App 3 6 Email/SMS & App 50 7 All three 41 Total 219

slide-11
SLIDE 11

Adoption

SMS/Email is the most popular 2F (89.95%) App (45.20%) Token (24.20%)

Context

Token Email/SMS App 11

10.19% 15.77% 45.36%

69.42% 54.48% 39.18% 20.39% 29.75% 15.46% Financial Personal Work Token Email/SMS App

Χ2(4, 582)= 65.18, p<.0001)

slide-12
SLIDE 12

Motivations

37.57%

9.25% 53.18% App Forced Incentive Voluntary 12

44.90% 43.52%

19.73% 11.65% 35.37% 44.48% Token Email/SMS

Χ2(4, 775)= 14.68, p<.0001)

slide-13
SLIDE 13

Quick Enjoy Helpful Not Enjoy User Friendly Concentration Stressful Convenient

13

Enjoy Reuse Need Instruction Match Frustrating Trust Secure Easy Convenient

  • A. Karole, etc. A comparative usability evaluation of traditional password managers. In ICISC, 2011.
  • J. Bonneau, etc. The quest to replace passwords: a Framework for comparative evaluation of web

authentication schemes. IEEE Symposium on Security and Privacy, 2012.

slide-14
SLIDE 14

Quick Enjoy Helpful Need Instruction Concentration Stressful Trust Convenient Ease of Use Cognitive Efforts Trustworthiness

14

Enjoy Reuse Not Enjoy User Friendly Stressful Match Frustrating Secure 32% 15% 14% Variance Explained

slide-15
SLIDE 15

4 5 6 7 Token Email/SMS App

15

1 2 3 4 SUS Ease of Use

  • Cog. Efforts

Trustworthiness

slide-16
SLIDE 16

MANOVA analysis (groups 4, 6 & 7)

DVs: Ease of use, Cognitive Efforts and Trustworthiness IV: Technology (2F technologies used) Covariates: Age and gender

Results Results

No main effect of Technology Some usability differences w.r.t age and gender:

Email/SMS and Token users (group 4) The elderly (Md=3) need more Cognitive Efforts than the young (Md=2, p=0.003) Email/SMS and App users (group 6) The elderly (Md=5.5) find that 2F are less trustworthy than the young (Md=6, p=.0007) Users of all 3 technologies (group 7) Females (Md=2.75) need more Cognitive Efforts than males (Md=2.0, p=.001)

16

slide-17
SLIDE 17

Main results

Different 2F technologies are preferred in different contexts Did not find usability difference among three 2F technologies Identified two additional dimensions of 2F usability: Cognitive Identified two additional dimensions of 2F usability: Cognitive Efforts and Trustworthiness

Future work

Larger variety of 2F technologies and participants Develop a usability scale for 2F technologies

17

slide-18
SLIDE 18

BACKUP

18

slide-19
SLIDE 19

Interviews

1 on 1 meeting, $10 Amazon Gift Card compensation

Questions

  • 1. Which 2F have you used? (Adoption)

PIN from a paper/card

  • 1. Which 2F have you used? (Adoption)
  • 2. How does 2F work? (Understanding)
  • 3. Why do you use 2F? (Motivation)
  • 4. Recall last time you used 2F? (Familiarity)
  • 5. What issues do you have with 2F? (Comments)

19

PIN from a paper/card Digital certificate RSA token code Verisign token code Paypal token code Google Authenticator PIN received by SMS/email USB token Smartcard

slide-20
SLIDE 20

Selected 9/29 from survey

Most of them from silicon valley Only participants familiar with 2F Age: 21 to 49 Gender: 5 males, 4 females Education: High school to PhD Security: 5/9 background in computer security

20