position paper
play

Position Paper: Measuring the Impact of Alphabet and Culture on - PowerPoint PPT Presentation

Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords Adam J. Aviv, United States Naval Academy, US Markus Drmuth , Ruhr-University Bochum, Germany Payas Gupta, NYU Abu Dhabi WAY Workshop 2016 Markus Drmuth |


  1. Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords Adam J. Aviv, United States Naval Academy, US Markus Dürmuth , Ruhr-University Bochum, Germany Payas Gupta, NYU Abu Dhabi WAY Workshop 2016 Markus Dürmuth | Horst Görtz Institute for IT-Security

  2. Graphical passwords Android unlock patterns • Graphical information is easier to remember and easier to enter on touchscreens • Android uses a restricted Pass-Go scheme • Probably one of the most studied graphical authentication schemes 2 Markus Dürmuth | Horst Görtz Institute for IT-Security

  3. Frequent starting points [Uellenbeck et al. CCS 2013] 43% 6% 9% 6% 2% 4% 18% 4% 8% 3 Markus Dürmuth | Horst Görtz Institute for IT-Security

  4. Frequent 3-grams [Uellenbeck et al. CCS 2013] 4 Markus Dürmuth | Horst Görtz Institute for IT-Security

  5. Frequent “letters” [Uellenbeck et al. CCS 2013] 5 Markus Dürmuth | Horst Görtz Institute for IT-Security

  6. Some known results • Android Patterns – Influenced by • gender, handedness, locale [Aviv et al.] • experience in IT security, gender, age [Loge et al.] • PassFaces – Influenced by gender and race • Text passwords – Influenced by language, … 6 Markus Dürmuth | Horst Görtz Institute for IT-Security

  7. Influencing factors: Directionality of writing systems LtR TtB RtL LtR (left-to-right, top-to-bottom): Latin alphabet, most western languages RtL (right-to-left, top-to-bottom): Arabic languages TB-RL (top-to-bottom, right-to-left): scripts such as Chinese, Japanese, and Korean 7 Markus Dürmuth | Horst Görtz Institute for IT-Security

  8. Influencing factors: Language English French German Turkish Polish Icelandic c 2.78% 3.26% 2.73% 1.46% 3.90% 0 h 6.09% 0.74% 4.58% 1.21% 1.02% 1.87% k 0.77% 0.05% 1.42% 5.68% 2.75% 3.31% q 0.10% 1.36% 0.02% 0 0 0 w 2.36% 0.07% 1.92% 0 5.81% 0 y 1.97% 0.13% 0.04% 3.34% 3.21% 0.90% z 0.07% 0.33% 1.13% 1.50% 4.85% 0 8 Markus Dürmuth | Horst Görtz Institute for IT-Security

  9. Influencing factor: Culture 9 Markus Dürmuth | Horst Görtz Institute for IT-Security

  10. Research questions • password • Language features effect on • pattern strength spoken • Bilinguality within group • Alphabet • pattern strength • Writing globally • possibilities to direction • “Culture” improve password choice 10 Markus Dürmuth | Horst Görtz Institute for IT-Security

  11. Challenges • Vast space of questions – Some are (relatively) obviously – Some are (almost certainly) very hard • E.g.: – Starting point based on writing direction – “Letters used” based on alphabet – What is the influence on other graphical password schemes? (Emojis?) – What other aspects of “cultural background” may influence user choice? – How does cultural background influence affect password meters? – …how we can help a user with other security -related tasks? 11 Markus Dürmuth | Horst Görtz Institute for IT-Security

  12. Challenges • Recruitment – how to sample a comparable and representable set of participants from different cultural backgrounds? – we need comparable samples from a diverse cultural backgrounds – preferably also samples that are representative for the entire population (using mobile devices) – Mechanical Turk unsuited (?) – students 12 Markus Dürmuth | Horst Görtz Institute for IT-Security

  13. Challenges • Translation – rather technical language 13 Markus Dürmuth | Horst Görtz Institute for IT-Security

  14. Brief Announcement… 14 Markus Dürmuth | Horst Görtz Institute for IT-Security

  15. Passwords Conference 2016 @ Ruhr-University Bochum December 5-7, 2016 Abstract submission: 2016-07-04 Paper submission: 2016-07-11 passwords2016.rub.de Markus Dürmuth | Horst Görtz Institute for IT-Security

  16. THANK YOU 16 Markus Dürmuth | Horst Görtz Institute for IT-Security

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend