on the usability and security of password based user
play

On the Usability and Security of Password-Based User Authentication - PowerPoint PPT Presentation

On the Usability and Security of Password-Based User Authentication Maximilian Golla Thesis Defense, Bochum, Germany, May 29, 2019 User Authentication Competing requirements of security and usability . [1] Common Factors: Knowledge ( Password ,


  1. On the Usability and Security of Password-Based User Authentication Maximilian Golla Thesis Defense, Bochum, Germany, May 29, 2019

  2. User Authentication Competing requirements of security and usability . [1] Common Factors: Knowledge ( Password , PIN) Biometrics (Fingerprint, Face) Possession (Security Key) Reinforced by: 2-Factor Authentication Risk-based Authentication 3 [Ref. 1] Joseph Bonneau et al.: The Quest to Replace Passwords : Bochum , May 29, 2019 | Thesis Defense ‘19 A Framework for Comparative Evaluation of Web Authentication Schemes. (SP '12)

  3. Passwords Are Not Dead Primary means of authentication on the Web. [2] • Accounts: ~ 24 • Passwords: 6-8 Memorability Issues Coping Weak Reused Passwords Passwords 5 Bochum , May 29, 2019 | Thesis Defense ‘19 [Ref. 2] Sarah Pearman et al.: Let's Go in For a Closer Look: Observing Passwords in Their Natural Habitat . (CCS ‘17)

  4. Overview Thesis Password Password Mobile Management Strength Authentication CCS 16 CCS 18, SP 19 USEC 17, USEC 19, CCS 19* Password Password Access Recovery Reuse Control PW 15, NDSS 17, USEC 19 CCS 18 USENIX Sec. 18 Workshops : Rate-Limiting, Semantics of Passwords, Strength Meter 6 [*] Under review Bochum , May 29, 2019 | Thesis Defense ‘19

  5. Overview Today Password Password Mobile Management Strength Authentication CCS 16 CCS 18, SP 19 USEC 17, USEC 19, CCS 19* Password Password Access Recovery Reuse Control PW 15, NDSS 17, USEC 19 CCS 18 USENIX Sec. 18 Workshops : Rate-Limiting, Semantics of Passwords, Strength Meter 7 [*] Under review Bochum , May 29, 2019 | Thesis Defense ‘19

  6. Outline Reuse Notifications Strength Meter Introduction 8 Bochum , May 29, 2019 | Thesis Defense ‘19

  7. How Users Choose Passwords • Well-defined process • Misconceptions in mental model “Adding ‘!’ to the end instantly makes it secure.” [3] • Estimating strength not easy 9 [Ref. 3] Ur et al.: “I Added ‘!’ at the End to Make It Secure” : Observing Password Creation in the Lab. (SOUPS ‘15) Bochum , May 29, 2019 | Thesis Defense ‘19

  8. Estimating the Strength of a Password is Tough “Adding ‘!’ to the end instantly makes it secure.” [3] Password 1: Password 2: iloveyou88 ieatkale88 Options : A. Password 1 is stronger B. Password 2 is stronger C. They are equally strong 10 [Ref. 3] Ur et al.: “I Added ‘!’ at the End to Make It Secure” : Observing Password Creation in the Lab. (SOUPS ‘15) Bochum , May 29, 2019 | Thesis Defense ‘19

  9. Estimating the Strength of a Password is Tough “Adding ‘!’ to the end instantly makes it secure.” [3] Password 1: Password 2: > iloveyou88 ieatkale88 Guess Number: Guess Number: 1.5 x 10 4 3.1 x 10 9 12 [Ref. 3] Ur et al.: “I Added ‘!’ at the End to Make It Secure” : Observing Password Creation in the Lab. (SOUPS ‘15) Bochum , May 29, 2019 | Thesis Defense ‘19

  10. Support Users in Choosing Secure Passwords St Strength Meter 13 Bochum , May 29, 2019 | Thesis Defense ‘19

  11. But They Are Not Always Accurate 14 Bochum , May 29, 2019 | Thesis Defense ‘19

  12. How to Measure Accuracy? Reference Strength Meter 123456 Ranking Ranking 15 Bochum , May 29, 2019 | Thesis Defense ‘19

  13. LUDS-based Meter: Strong Password1 L: U: D: S: 17 Bochum , May 29, 2019 | Thesis Defense ‘19

  14. Password “Strength” Reference : Guess number Meter : ??? . Meter Example Text Weak, Medium, Strong Colors Red, Orange, Green Percentages 42% Scores 1-5 Time 12 d, 9h, 47m Entropy 82 bits Guess number 1 018 291 guesses 18 Bochum , May 29, 2019 | Thesis Defense ‘19

  15. Simulation Dataset Passwords Count Password 1 044 164 123456 176 120 password 88 076 12345678 78 720 111111 ... … 356 charlie22 356 mickey7 … … 1 ~!@#!?~!@ 19 Bochum , May 29, 2019 | Thesis Defense ‘19

  16. Simulate Common Errors Observed in Real-World Meters Monotonic Transformations Quantization Reference Meter Disturbances Random sampling 20 Bochum , May 29, 2019 | Thesis Defense ‘19

  17. After: Quantized Output Reference Meter 63 40 19 30 Weak 9 20 Medium 3 20 Good 2 10 Strong 1 10 … … (Count) (Bin) 22 Bochum , May 29, 2019 | Thesis Defense ‘19

  18. Result: Compare Ranking Recommendation: Large-Scale Comparison • Compare relative ranking only 81 implementations • • Academia Weight passwords by importance • Websites Weighted and ranked metrics • PW Manager (e.g., weighted Spearman correlation) • Operating Systems • Previous Work What can we do with this information? password-meter-comparison.org 24 Bochum , May 29, 2019 | Thesis Defense ‘19

  19. Outline Reuse Notifications Strength Meter Introduction 25 Bochum , May 29, 2019 | Thesis Defense ‘19

  20. 26 Bochum , May 29, 2019 | Thesis Defense ‘19

  21. Reuse Attacks? Email Cracked SHA-1 Hiking91 jenny@gmail.com R0cky!17 joe oe@mail il.com ILoveBananas! john@hotmail.com 1 guess can be ... ... enough! I used “ R0cky!17 ” everywhere! Email Secure Argon2i Hash joe@mail.com $argon2i$v=19$m=4096,… … … 27 Bochum , May 29, 2019 | Thesis Defense ‘19

  22. 28 Bochum , May 29, 2019 | Thesis Defense ‘19

  23. “Stolen From Another Site” 29 Bochum , May 29, 2019 | Thesis Defense ‘19

  24. Study 1: Previously Sent Notifications Understanding Feelings Actions Perceptions Effectiveness Delivery Method Legitimacy MTurk, 15min, 180 respondents, $2.50 30 Bochum , May 29, 2019 | Thesis Defense ‘19

  25. “You've got e - mail! ... shall I deal with it now?” Concerning and a priority (83% very high or high) 31 Bochum , May 29, 2019 | Thesis Defense ‘19

  26. “Should I worry?” 32 Bochum , May 29, 2019 | Thesis Defense ‘19

  27. “Something happened and you need to click ‘OK’ to get on with things.” [6] What may have caused you to receive this notification? [Multi select] 60% Account hacked 21% New device (false alarm) 21% Data breach 19% Reuse 33 [Ref. 6] by Johnathan Nightingale – Firefox Software Engineer at Mozilla; [Img 1.] Guy Fawkes by Carlotta Rosi - thecirqle.com Bochum , May 29, 2019 | Thesis Defense ‘19

  28. Call a Spade a Spade! Don’t mention reuse Allude to reuse 0 - 4% 48 - 56% respondents respondents listed reuse as a cause for receiving this notification. 34 Bochum , May 29, 2019 | Thesis Defense ‘19

  29. Incomplete Mental Models “The chances of someone guessing that I use the same password are still incredibly low.” (R171) Current password-reuse notifications: cause concern explain the situation 36 Bochum , May 29, 2019 | Thesis Defense ‘19

  30. Study 2: Components of Notifications Delivery Medium Pus ush / In In-App / Em Email il Incident Unr Unrelated / Ou Our / - Account Activity No o sus suspicious / Sus Suspicious s / - Remediation Cr Create ne new / Recommend Other Accounts Cha Change all all / - Extra Actions MTurk, 588 Respondents Ena Enable 2F 2FA + + Manager / - 37 Bochum , May 29, 2019 | Thesis Defense ‘19

  31. … Unhealthy Behavior What would you do about it? What would your new password be? 90% Change it 68% Modified password 6% Keep it the same 13% Reused password 4% Don’t know 11% Use manager/browser 6% Other 2% Completely new 39 Bochum , May 29, 2019 | Thesis Defense ‘19

  32. Incomplete Mental Models “The hack wasn't specific to this company so it doesn't worry me.” (R69) After seeing a reuse notification, users would change password … but ineffectively have incomplete mental models 41 Bochum , May 29, 2019 | Thesis Defense ‘19

  33. Mockup 42 Bochum , May 29, 2019 | Thesis Defense ‘19

  34. Conclusion Reuse Notifications Passwords Strength Meter 43 Bochum , May 29, 2019 | Thesis Defense ‘19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend