SlideShare uma empresa Scribd logo
1 de 73
Usable Security:
When Security Meets Usability
Shujun LI (李树钧)
Senior Lecturer (Associate Professor)
Department of Computing
University of Surrey
http://www.hooklee.com
2
Outline
- Where is University of Surrey? 
- Humans = The Weakest Link?
- Security vs. Usability
- Example 1: Passwords
- Usability-security dilemma: textual passwords
- Graphical passwords: a better solution?
- Example 2: CAPTCHAs
- A brief introduction to the term
- Usability-security dilemma
- Some Selected Topics for Research
3
London  Guildford, Surrey
Highway A3: 33 miles
Fastest train: 33 mins
4
University of Surrey @ Guildford
Guildford Railway
Station 
University of Surrey
Campus (by walk):
17 mins
5
Dept. Computing @ University of Surrey
Usable Security
Humans = The Weakest Link?
7
Security is a process, NOT a product.
- A product is secure A process is secure.
(Bruce Schneier)
6)
8
Social engineering attacks do work well!
- Hackers only need to break the weakest link in a
process – humans!
9
A real hacker’s testimony
Testifying before Congress not long ago, I explained
that I could often get passwords and other pieces of
sensitive information from companies by pretending
to be someone else and just asking for it.
Kevin D. Mitnick and William L. Simon
The Art of Deception: Controlling the Human Element of
Security (New York: John Wiley & Sons Inc., 2003).
10
Social engineering everywhere:
Phishing, SMiShing, vishing, …
- Getting your password from you.
11
Different kinds of weak humans
- Weak designers
- Weak programmers
- Weak assemblers
- Weak distributors
- Weak deployers
- Weak maintainers
- Weak users
- Weak …
 Security holes in the
delivered products
 Security holes in
the deployed system
12
Are you a weak link of your system?
- Have you installed PGP or any other encryption software
for your email client?
- How often do you use the above encryption software to
protect your personal emails?
- Have you ever written some of your passwords down (on
paper, on mobile phone, …) to avoid forgetting them?
- Are you sharing the same passwords over multiple web
sites?
- How often do you click the detail of a digital certificate
shown in your web browser and check its content?
- Have you changed the default password of your home
router?
Usable Security
Security vs. Usability
14
What does security mean?
- Confidentiality
- Information/Systems should be protected from unauthorized
access.
- Tools: Data encryption, user authentication, privacy enhancing
tools, …
- Integrity
- Information/Systems should be protected from unauthorized
manipulation.
- Tools: Cryptographic hashing, digital signature, …
- Availability
- Information should be protected from attacks making it unavailable
to legitimate users (e.g. DoS attacks).
- Tools: intrusion detection, distributed service, …
15
What does usability mean?
- There is no widely accepted explanation. My personal
summary is the following.
- Psychological Acceptability
- A computer system (its functionalities and especially its computer-
human interface) should be designed for easy and correct use
without error by any human user.
- Economic Acceptability
- A computer system should be acceptable to the target human users
with reasonable costs.
- Reconfigurability/Scalability/Sustainability/Manageability
- A computer system should be easily
reconfigured/maintained/managed to adapt to different/new
requirements of end users.
16
Security-usability dilemma
- Security is NOT what users want – users want their work to
be done and they don’t know what security really mean!
- Security often requires users to make HARD decisions, but
they do NOT have enough time or experience!
- Higher security often requires more computation  Higher
costs, slower process, more difficult to understand and use,
user’s tendency to misuse (intentional or unintentional), …
- Large systems involve many components and different
groups of users  requirements of different components
and users may conflict.
- Different aspects (C, I, A) of security may conflict with each
other as well, which further complicate the problem.
- …
17
Security-usability dilemma: examples!
- For passwords the dilemma is:
- If a password is very strong (secure), then it
is not usable (hard to remember).
- If a password is usable (easy to remember),
then it is very weak (insecure).
- If I have to use a strong password but cannot
remember it, I will write it down!
- For CAPCTAHs the dilemma is:
- If a CAPTCHA is strong (hard for machines),
then it is hard to solve by humans.
- If a CAPTCHA is easy for humans to solve, it
is often weak (i.e., easy for machine as well).
Usable Security
Example 1:
Passwords (for User Authentication)
19
How many passwords are there?
- 4 digits (PINs): 104 ≈213.3
- 6 digits (PINs): 106 ≈220
- Lowercase letters only, 7 characters:
267=8,031,810,176≈233
- Lowercase letters plus digits, 7 characters:
367=78,364,164,096 ≈236
- Lowercase and uppercase letters plus digits, 7
characters: 627=10,030,613,004,288 ≈242
- Lowercase and uppercase letters plus digits, 10
characters: 6210=839,299,365,868,340,224≈259.5
20
How fast are today’s computers?
255
21
What passwords are being used?
- Dinei Florêncio and Cormac Herley, A Large-Scale
Study of Web Password Habits, in Proc. WWW
2007, ACM/W3C
- Real passwords collected from 544,960 web users in
three months in 2006.
22
What passwords are being used?
- DataGenetics, PIN analysis, 3rd September 2012
- 3.4 million leaked passwords composed of 4 digits.
xy00
9999
00xy 19xy
mmdd
xyxy
23
Password cracking: 1979
- R. Morris and K. Thomson, “Password security: A
case history,” Communications of the ACM, vol.
22, no.11, 1979
- In a collection of 3,289 passwords…
- 15 were a single ASCII character
- 72 were strings of two ASCII characters
- 464 were strings of three ASCII characters
- 477 were strings of four alphamerics
- 706 were five letters, all upper-case or all lower-case
- 605 were six letters, all lower-case
- 492 appeared in dictionaries, name lists, and the like
2,831
passwords
24
Password cracking: 1990
- Daniel V. Klein, “Foiling the Cracker: A Survey
of, and Improvements to, Password Security,” in
Proc. USENIX Workshop on Security, 1990
- In a set of 15,000 passwords
- 25% were cracked within 12 CPU months
- 21% were cracked in the first week
- 2.7% were cracked within the first 15 minutes
25
Password cracking: 2005
- Arvind Narayanan and Vitaly Shmatikov, “Fast
dictionary attacks on passwords using time-
space tradeoff,” in Proc. CCS’2005, ACM
- In a collection of 142 real user passwords
- 67.6% (96) were cracked with a searching complexity
2.17×109≈231
25
26
Password cracking: 2013
- Dan Goodin, “Anatomy of a hack: How crackers
ransack passwords like ‘qeadzcwrsfxv1331’,” ars
technica, 28 May 2013
- Three crackers were given 16,449 hashed passwords
and the best of them was able to crack 90% of the
passwords.
- Remark 1: All the passwords are considered harder
ones because they are what remained uncracked in a
much larger database of leaked passwords.
- Remark 2: Nate Anderson, Ars deputy editor and a self-
admitted newbie to password cracking, was able to
crack around 50% of the passwords within a few hours.
Usable Security
Password Security-Usability
Dilemma: Solutions?
28
First the so-called XKCD method
29
More solutions?
- Passphrases
- Strong password policy
- Frequently changed passwords
- Dynamic passwords (such as iTANs)
- Hardware-based solutions
- One-time password generators (such as mTANs and RSA®
SecurID)
- Physical tokens (such as smart cards)
- Challenge-response protocols
- Biometrics (finger/face/iris/palm/… recognition, …)
- Graphical passwords…
30
Why may graphical passwords help?
- An old saying: “A picture is worth a thousand
words.”
31
Why may graphical passwords help?
- 一图胜千言。
32
Why may graphical passwords help?
- Graphics and images contain richer information
than texts, and harder to be exactly described by
both humans and computers.
-  Larger password space
-  Less weak passwords
-  More difficult to construct dictionary
-  Easier to remember and harder to forget
-  Harder to tell them to others (at least via phone )
-  A better balance between usability and security?
33
Yet another advantage
- Graphical passwords are more secure against two
new attacks:
- Martin Vuagnoux and Sylvain Pasini, Compromising
Electromagnetic Emanations of Wired and Wireless
Keyboards, in Proc. USENIX Security Symposium 2009
- Kehuan Zhang and XiaoFeng Wang, Peeping Tom in
the Neighborhood: Keystroke Eavesdropping on Multi-
User Systems, Proc. USENIX Security Symposium 2009
34
A classification of graphical passwords
- Class 1: Drawing-based passwords
- Class 2: Location-based graphical passwords
- Class 3: Recognition-based graphical passwords
- Class X: Hybrid graphical passwords?
35
Class 1: DAS (Draw-A-Secret)
- I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter and A. D.
Rubin, “The Design and Analysis of Graphical Passwords,”
in Proc. USENIX Security Symposium 1999 (Best paper
and best student paper awards!)
36
Class 2: PassPoints
- S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N.
Memon, PassPoints: Design and longitudinal evaluation of
a graphical password system, Int. J. Human-Computer
Studies, Vol. 63, pp. 102-127, 2005, Elsevier
37
Class 3: Passfaces and Déjà Vu
- PassfacesTM
- Déjà Vu (Dhamija & Perrig, USENIX Security’2000)
Random art
http://www.random-
art.org
38
Alert: Users’ choices are not random!
- Darren Davis, Fabian Monrose and Michael K. Reiter, “On
User Choice in Graphical Password Schemes,” in Proc.
USENIX Security Symposium 2004
Users tend to choose faces of
beautiful women and/or of
people in their own race.
39
Alert: dictionary attack comes back!
- Julie Thorpe and P.C. van Oorschot, “Human-Seeded Attacks and
Exploiting Hot-Spots in Graphical Passwords,” in Proc. USENIX
Security Symposium 2007
A dictionary of click points (hotspots) can be harvested from a set
of human users (at the attacker’s disposal), or automatically
determined by some image processing algorithms.  For
automated attack, 8% passwords were cracked within 232 guesses.
40
Alert: dictionary attack comes back!
- Amirali Salehi-Abari, Julie Thorpe, and P.C. van Oorschot, “On Purely
Automated Attacks and Click-Based Graphical Passwords,” in Proc.
ACSAC’2008, IEEE Computer Society
An improved dictionary attack: 16% passwords cracked using a
dictionary of less than 231.4 entries.
41
Alert: dictionary attack comes back!
- P.C. van Oorschot, Amirali Salehi-Abari and Julie Thorpe, “Purely
Automated Attacks on PassPoints-Style Graphical Passwords,” IEEE
Trans. Information Forensics and Security, 5(3), 2010
Improved dictionary attacks: 7-16% passwords cracked using a dictionary
of 226 entries, 48-54% passwords using a dictionary of 235 entries.
42
Alert: dictionary attack comes back!
- Krzysztof Golofit, “Click Passwords Under Investigation,” in
Proc. ESORICS’2007, Springer
43
Alert: dictionary attack comes back!
- Julie Thorpe, P.C. van Oorschot, “Graphical Dictionaries
and the Memorable Space of Graphical Passwords,” in
Proc. USENIX Security Symposium 2004
- Mirror symmetric DAS passwords are used to construct a dictionary
The sub-password-space is
exponentially smaller than the
full space.
44
Alert: dictionary attack comes back!
- Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu,
“On the Security of Picture Gesture Authentication,” in
Proc. USENIX Security Symposium 2013
- 10K Windows 8 Picture passwords were collected from 800 users.
- A training based approach: 24% of passwords cracked in one
database with a dictionary of size is 219 (total password space 231).
45
Alert: usability problems!
- Karen Renauda and Antonella De Angeli, “My password is
here! An investigation into visuo-spatial authentication
mechanisms,” Interacting with Computers, vol. 16, pp.
1017-1041, Elsevier, 2004
- Problem 1: the incredible difficulty related to choosing the
background image.
- Problem 2: the user’s difficulty in pin-pointing a good pass-
point.
-  “The cognitive aspects of visual information processing
would appear to make the use of spatial position untenable
for authentication systems.”
45
46
What have we learned?
- Textual passwords are bad.
- Graphical passwords haven’t been proven as a
(much) better replacement.
- There is still a long way ahead before we find a
real replacement of the current bad textual
passwords.
- For serious applications, moving to hardware
seems to the be most sensible choice.
Usable Security
Example 2: CAPTCHAs
48
Starter 1: SONY CAPTCHA
- CAPTCHA @ SONY web forum (2011)
- In Google Chrome 21.0.1180.75 m:
- In Mozilla Firefox 15.0.1:
- In MSIE 9.0.8.112.16421:
- It is obviously weak, but…
49
Starter 2: an e-banking CAPTCHA
- CAPTCHA @ a Chinese bank’s e-banking login
Web page
- In all web browsers:
- It seems to be better than the previous one, but is not
really strong. However, the simplest way of breaking it is
… 5555555555555555555555555555555555555555555455555555555555555555555555555555555555555555555555555555
5555555555555555555555555555555555555551555545555555455555555555555555555555555555555555555555555555
5555555555555555555555555555555555555511555555555554555555555555555555555555555555555555555555555555
5555555555555555555555555555555555555115555555555555555555555555555555555000000005555555555555555555
5555545555555555555555555555554155555115555555555555333555555555555555500000000005555555555555555555
5555544222225555555555555555511445551155555555555555333333555555555555505555550005555555555555555555
5555542222222255555555555555551114551155555555555555333333335555555555555555500055555555555555555555
5555522255552255555555555555551111511555555555555553335555333555555555555555500055555555555555555555
5555522255552225555555555455555111511555555555555553335555333555555555555555000555555555555555555555
5555522255455222555555555545555111115555555555555553335555333555555555555555000455555555555555555555
5555522254445222555555555554555511115555555555555553333333333555555555555550005555555555555555555555
5555552225555222555555555555455511155555555555555553333333355555555555555550005555555555555555555555
5555552222552222555555555555555551155555555555555553335533355555555555555500005555555554555555555555
5555555522222222555555555555555551155555555555555553335553335555555555555500055555555445555555555555
5555555555555222555555555555555511155555555555555553335555333555555555555000055555554555555555555555
5555555555555222555555555555555511155555555555555553335555333555555555555000555500055555555555555555
5555555555555222555555555444455511155555555555555533335553333555555555544000000000055555555555555555
5555555254452225555555555555555511155555555555555553333333333555555555555440005555555555555555555555
5555555222222225555555555555555515555555555555555555555333335555555555555555555555555555555555555555
5555555552222555555555555555555555555555555555555555555555555555555555555555555555555555555555555555
5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555
5455555555555555555555555555555555555555544455555555555555555555555555555555555555555555555555555555
5545555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555455555
5545555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555455555
5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555545555
5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555545555
5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555554555
5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555
50
Starter 3: CAPTCHA @ a Chinese site
- “Input the result of executing the above code
________ refresh the page to get other code”.
51
More starters: top 10 worst CAPTCHAs
- No. 1:
- No. 2:
- No. 3:
Usable Security
Captchas (or CAPTCHAs):
A Brief Introduction
53
What are Captchas (or CAPTCHAs)?
- CAPTCHA
- Completely Automated Public Turing test to tell
Computers and Humans Apart
- It was proposed to fight against automated programs
abusing web resources (e.g. spamming).
I am human!
Then solve this!
54
CAPTCHA has many names!
- CAPTCHA: A Turing test?
- Automated Turing Test? – The human interrogator in a
Turing test is automated by a computer.
- Reversed Turing Test? – The role of something (human
interrogator) is reversed in a Turing test.
- CAPTCHA = HIP (Human Interactive Proof)?
- Historically, Blum et al. coined the term HIP to cover
many human-involved security systems including
CAPTCHA and HumanOID.
- So, CAPTCHA  HIP.
- CAPTCHA = Authentication code?
- …
55
CAPTCHA: before the term was coined
- Moni Naor, Verification of a human in the
loop or identification via the Turing test, 1996
- , “Add-URL” web page, protected by
a scheme later known as CAPTCHA, 1997
- US Patent 6195698, Method for
selectively restricting access to computer
systems, filed on 13 April, 1998, issued on 27
February, 2001
- Jun Xu, Richard Lipton and Irfan Essa, Hello,
Are You Human? Georgia Institute of
Technology College of Computing Technical
Report, GIT-CC-00-28, 13 November 2000
56
CAPTCHA: after the term was coined
- 2000: Udi Manber from described the
“chat room problem” to Manuel Blum at the UC
Berkeley (who later moved to the CMU).
- 2000-2003: Blum and his collaborators coined the
term “CAPTCHA” and proposed some early
designs at www.captcha.net.
- 2002: the first report on
breaking CAPTCHAs appeared.
- 2002 onwards: a new kind of
cat-and-mouse game…
57
CAPTCHAs everywhere
- Many (most?) user registration web pages are
protected by CAPTCHAs.
- Many login pages and web forms as well.
58
CAPTCHAs everywhere
- CAPTCHA (reCAPTCHA) has been used for
digitizing books by Google.
59
CAPTCHAs everywhere
- CAPTCHA has been used as a new advertising
platform as well!
60
CAPTCHAs everywhere
- SweetCaptcha
- PlayThru
- MotionCAPTCHA
61
Multi-CAPTCHA engines
- One example
Usable Security
CAPTCHA:
Security-Usability Dilemma
63
Insecure but usable CAPTCHAs
- Almost all (if not all) e-banking CAPTCHAs [S. Li
et al. ACSAC 2010]
64
Strong but less usable CAPTCHAs
- Google CAPTCHA (not reCAPTCHA)
- Simplest are not very hard to solve
- Averagely OK?
- Some are very hard (if not impossible) to solve
- Google has replaced this CAPTCHA by reCAPTCHA for
user registration, but still keep it for login (only after
three continuous login errors occur).
65
CAPTCHA security mixed with usability
- Attackers are recruiting humans to do the job!
66
CAPTCHA security mixed with usability
- Attackers also know how to recruit humans without
even paying them a penny (since 2007)!
67
Questions about CAPTCHAs
- Can we finally find a CAPTCHA scheme with a
better balance between security and usability?
- Can security and usability be measured
automatically?
- Do we have any alternative solutions to the
problem?
- Cost-based proof-of-work (PoW) protocols?
- CAPTCHA + (Behavioural) Biometrics?
- CAPTCHA + BMI (brain-machine interface)?
- …
Usable Security
Selected Topics for Research
69
Usable security research
- New forms of graphical passwords
- Pass-Maps: passwords on world maps
- New hardware based user authentication schemes
- Lower costs, simpler HCI, less system requirements, …
- New user authentication scheme secure against
observers
- Observers = shoulder-surfers, hidden cameras,
keyloggers, screen scrapers, malware, …
- Automated security and usability evaluation
- Human simulators, crowdsourcing, formal methods, …
70
Usable security research
- New password management frameworks
- Password policies: Organization vs. Individual
- Human factor vs. Trust management
- Why should users trust a piece of software?
- Password cracking
- Discovery of new rules
- Modeling of human behaviour
- Password strength measurement
- Security visualization
- Better visualization of passwords?
71
Usable security research
- Privacy management
- Privacy vs. Security
- User privacy vs. Digital forensics
- Economic modeling of computer security systems
and related human behaviour
- Business model vs. Mental model
- End users vs. Cyber criminals
- Underground economy
- Human factors and their impact on security of e-
payment systems
- Does NFC based banking bring new security problems?
72
Usable security research
- Impact of mobile computing on usable security
- Enhanced mobility = Better usability = Worse security?
- Usability and security of mobile banking systems
- Usability and security issues in smart homes
- Smart grid and meters
- Smart TV (e.g. TV banking)
- Usability and security of physical-cyber systems
- Internet of Things
- Car security
- Medical and health devices
- …
Usable Security
Thanks for your attention!
Questions + Answers 
Collaborations?

Mais conteúdo relacionado

Mais procurados

Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
Splunk
 

Mais procurados (20)

API Security Lifecycle
API Security LifecycleAPI Security Lifecycle
API Security Lifecycle
 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development Security
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
SplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNowSplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNow
 
Observability For Modern Applications
Observability For Modern ApplicationsObservability For Modern Applications
Observability For Modern Applications
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Jenkins with SonarQube
Jenkins with SonarQubeJenkins with SonarQube
Jenkins with SonarQube
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)
 

Destaque

Observer-Resistant Password Systems: How hard to make them both usable and se...
Observer-Resistant Password Systems:How hard to make them both usable and se...Observer-Resistant Password Systems:How hard to make them both usable and se...
Observer-Resistant Password Systems: How hard to make them both usable and se...
Shujun Li
 
Usability and security in future voting systems
Usability and security in future voting systemsUsability and security in future voting systems
Usability and security in future voting systems
Dana Chisnell
 

Destaque (17)

Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
 
From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...
 
Observer-Resistant Password Systems: How hard to make them both usable and se...
Observer-Resistant Password Systems:How hard to make them both usable and se...Observer-Resistant Password Systems:How hard to make them both usable and se...
Observer-Resistant Password Systems: How hard to make them both usable and se...
 
Usability and security in future voting systems
Usability and security in future voting systemsUsability and security in future voting systems
Usability and security in future voting systems
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
Usable security it isn't secure if people can't use it mwux 2 jun2012
Usable security   it isn't secure if people can't use it mwux 2 jun2012Usable security   it isn't secure if people can't use it mwux 2 jun2012
Usable security it isn't secure if people can't use it mwux 2 jun2012
 
Usable security
Usable securityUsable security
Usable security
 
(Un)usable Security
(Un)usable Security(Un)usable Security
(Un)usable Security
 
Security vs. UX
Security vs. UXSecurity vs. UX
Security vs. UX
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 
E-money
E-moneyE-money
E-money
 
Human computer interaction
Human  computer interactionHuman  computer interaction
Human computer interaction
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)
 

Semelhante a Usable Security: When Security Meets Usability

Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptx
Muddasarahmed5
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
Iszamli Jailani
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
DIPESH30
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdf
aoneonlinestore1
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems Used
Carla Bennington
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
MaximaSheffield592
 

Semelhante a Usable Security: When Security Meets Usability (20)

Human/User-Centric Security
Human/User-Centric SecurityHuman/User-Centric Security
Human/User-Centric Security
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...When will passwords die? Research challenges and opportunities in user authen...
When will passwords die? Research challenges and opportunities in user authen...
 
Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptx
 
Network Security
Network Security Network Security
Network Security
 
Intro
IntroIntro
Intro
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdf
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems Used
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Computer Security.ppt
Computer Security.pptComputer Security.ppt
Computer Security.ppt
 
SecurityBasics.ppt
SecurityBasics.pptSecurityBasics.ppt
SecurityBasics.ppt
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
Android based message encryption decryption using matrix
Android based message encryption  decryption using matrixAndroid based message encryption  decryption using matrix
Android based message encryption decryption using matrix
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
 

Último

dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
AlMamun560346
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
Sérgio Sacani
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
Areesha Ahmad
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 

Último (20)

pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
 
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 

Usable Security: When Security Meets Usability

  • 1. Usable Security: When Security Meets Usability Shujun LI (李树钧) Senior Lecturer (Associate Professor) Department of Computing University of Surrey http://www.hooklee.com
  • 2. 2 Outline - Where is University of Surrey?  - Humans = The Weakest Link? - Security vs. Usability - Example 1: Passwords - Usability-security dilemma: textual passwords - Graphical passwords: a better solution? - Example 2: CAPTCHAs - A brief introduction to the term - Usability-security dilemma - Some Selected Topics for Research
  • 3. 3 London  Guildford, Surrey Highway A3: 33 miles Fastest train: 33 mins
  • 4. 4 University of Surrey @ Guildford Guildford Railway Station  University of Surrey Campus (by walk): 17 mins
  • 5. 5 Dept. Computing @ University of Surrey
  • 6. Usable Security Humans = The Weakest Link?
  • 7. 7 Security is a process, NOT a product. - A product is secure A process is secure. (Bruce Schneier) 6)
  • 8. 8 Social engineering attacks do work well! - Hackers only need to break the weakest link in a process – humans!
  • 9. 9 A real hacker’s testimony Testifying before Congress not long ago, I explained that I could often get passwords and other pieces of sensitive information from companies by pretending to be someone else and just asking for it. Kevin D. Mitnick and William L. Simon The Art of Deception: Controlling the Human Element of Security (New York: John Wiley & Sons Inc., 2003).
  • 10. 10 Social engineering everywhere: Phishing, SMiShing, vishing, … - Getting your password from you.
  • 11. 11 Different kinds of weak humans - Weak designers - Weak programmers - Weak assemblers - Weak distributors - Weak deployers - Weak maintainers - Weak users - Weak …  Security holes in the delivered products  Security holes in the deployed system
  • 12. 12 Are you a weak link of your system? - Have you installed PGP or any other encryption software for your email client? - How often do you use the above encryption software to protect your personal emails? - Have you ever written some of your passwords down (on paper, on mobile phone, …) to avoid forgetting them? - Are you sharing the same passwords over multiple web sites? - How often do you click the detail of a digital certificate shown in your web browser and check its content? - Have you changed the default password of your home router?
  • 14. 14 What does security mean? - Confidentiality - Information/Systems should be protected from unauthorized access. - Tools: Data encryption, user authentication, privacy enhancing tools, … - Integrity - Information/Systems should be protected from unauthorized manipulation. - Tools: Cryptographic hashing, digital signature, … - Availability - Information should be protected from attacks making it unavailable to legitimate users (e.g. DoS attacks). - Tools: intrusion detection, distributed service, …
  • 15. 15 What does usability mean? - There is no widely accepted explanation. My personal summary is the following. - Psychological Acceptability - A computer system (its functionalities and especially its computer- human interface) should be designed for easy and correct use without error by any human user. - Economic Acceptability - A computer system should be acceptable to the target human users with reasonable costs. - Reconfigurability/Scalability/Sustainability/Manageability - A computer system should be easily reconfigured/maintained/managed to adapt to different/new requirements of end users.
  • 16. 16 Security-usability dilemma - Security is NOT what users want – users want their work to be done and they don’t know what security really mean! - Security often requires users to make HARD decisions, but they do NOT have enough time or experience! - Higher security often requires more computation  Higher costs, slower process, more difficult to understand and use, user’s tendency to misuse (intentional or unintentional), … - Large systems involve many components and different groups of users  requirements of different components and users may conflict. - Different aspects (C, I, A) of security may conflict with each other as well, which further complicate the problem. - …
  • 17. 17 Security-usability dilemma: examples! - For passwords the dilemma is: - If a password is very strong (secure), then it is not usable (hard to remember). - If a password is usable (easy to remember), then it is very weak (insecure). - If I have to use a strong password but cannot remember it, I will write it down! - For CAPCTAHs the dilemma is: - If a CAPTCHA is strong (hard for machines), then it is hard to solve by humans. - If a CAPTCHA is easy for humans to solve, it is often weak (i.e., easy for machine as well).
  • 18. Usable Security Example 1: Passwords (for User Authentication)
  • 19. 19 How many passwords are there? - 4 digits (PINs): 104 ≈213.3 - 6 digits (PINs): 106 ≈220 - Lowercase letters only, 7 characters: 267=8,031,810,176≈233 - Lowercase letters plus digits, 7 characters: 367=78,364,164,096 ≈236 - Lowercase and uppercase letters plus digits, 7 characters: 627=10,030,613,004,288 ≈242 - Lowercase and uppercase letters plus digits, 10 characters: 6210=839,299,365,868,340,224≈259.5
  • 20. 20 How fast are today’s computers? 255
  • 21. 21 What passwords are being used? - Dinei Florêncio and Cormac Herley, A Large-Scale Study of Web Password Habits, in Proc. WWW 2007, ACM/W3C - Real passwords collected from 544,960 web users in three months in 2006.
  • 22. 22 What passwords are being used? - DataGenetics, PIN analysis, 3rd September 2012 - 3.4 million leaked passwords composed of 4 digits. xy00 9999 00xy 19xy mmdd xyxy
  • 23. 23 Password cracking: 1979 - R. Morris and K. Thomson, “Password security: A case history,” Communications of the ACM, vol. 22, no.11, 1979 - In a collection of 3,289 passwords… - 15 were a single ASCII character - 72 were strings of two ASCII characters - 464 were strings of three ASCII characters - 477 were strings of four alphamerics - 706 were five letters, all upper-case or all lower-case - 605 were six letters, all lower-case - 492 appeared in dictionaries, name lists, and the like 2,831 passwords
  • 24. 24 Password cracking: 1990 - Daniel V. Klein, “Foiling the Cracker: A Survey of, and Improvements to, Password Security,” in Proc. USENIX Workshop on Security, 1990 - In a set of 15,000 passwords - 25% were cracked within 12 CPU months - 21% were cracked in the first week - 2.7% were cracked within the first 15 minutes
  • 25. 25 Password cracking: 2005 - Arvind Narayanan and Vitaly Shmatikov, “Fast dictionary attacks on passwords using time- space tradeoff,” in Proc. CCS’2005, ACM - In a collection of 142 real user passwords - 67.6% (96) were cracked with a searching complexity 2.17×109≈231 25
  • 26. 26 Password cracking: 2013 - Dan Goodin, “Anatomy of a hack: How crackers ransack passwords like ‘qeadzcwrsfxv1331’,” ars technica, 28 May 2013 - Three crackers were given 16,449 hashed passwords and the best of them was able to crack 90% of the passwords. - Remark 1: All the passwords are considered harder ones because they are what remained uncracked in a much larger database of leaked passwords. - Remark 2: Nate Anderson, Ars deputy editor and a self- admitted newbie to password cracking, was able to crack around 50% of the passwords within a few hours.
  • 28. 28 First the so-called XKCD method
  • 29. 29 More solutions? - Passphrases - Strong password policy - Frequently changed passwords - Dynamic passwords (such as iTANs) - Hardware-based solutions - One-time password generators (such as mTANs and RSA® SecurID) - Physical tokens (such as smart cards) - Challenge-response protocols - Biometrics (finger/face/iris/palm/… recognition, …) - Graphical passwords…
  • 30. 30 Why may graphical passwords help? - An old saying: “A picture is worth a thousand words.”
  • 31. 31 Why may graphical passwords help? - 一图胜千言。
  • 32. 32 Why may graphical passwords help? - Graphics and images contain richer information than texts, and harder to be exactly described by both humans and computers. -  Larger password space -  Less weak passwords -  More difficult to construct dictionary -  Easier to remember and harder to forget -  Harder to tell them to others (at least via phone ) -  A better balance between usability and security?
  • 33. 33 Yet another advantage - Graphical passwords are more secure against two new attacks: - Martin Vuagnoux and Sylvain Pasini, Compromising Electromagnetic Emanations of Wired and Wireless Keyboards, in Proc. USENIX Security Symposium 2009 - Kehuan Zhang and XiaoFeng Wang, Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi- User Systems, Proc. USENIX Security Symposium 2009
  • 34. 34 A classification of graphical passwords - Class 1: Drawing-based passwords - Class 2: Location-based graphical passwords - Class 3: Recognition-based graphical passwords - Class X: Hybrid graphical passwords?
  • 35. 35 Class 1: DAS (Draw-A-Secret) - I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter and A. D. Rubin, “The Design and Analysis of Graphical Passwords,” in Proc. USENIX Security Symposium 1999 (Best paper and best student paper awards!)
  • 36. 36 Class 2: PassPoints - S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N. Memon, PassPoints: Design and longitudinal evaluation of a graphical password system, Int. J. Human-Computer Studies, Vol. 63, pp. 102-127, 2005, Elsevier
  • 37. 37 Class 3: Passfaces and Déjà Vu - PassfacesTM - Déjà Vu (Dhamija & Perrig, USENIX Security’2000) Random art http://www.random- art.org
  • 38. 38 Alert: Users’ choices are not random! - Darren Davis, Fabian Monrose and Michael K. Reiter, “On User Choice in Graphical Password Schemes,” in Proc. USENIX Security Symposium 2004 Users tend to choose faces of beautiful women and/or of people in their own race.
  • 39. 39 Alert: dictionary attack comes back! - Julie Thorpe and P.C. van Oorschot, “Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords,” in Proc. USENIX Security Symposium 2007 A dictionary of click points (hotspots) can be harvested from a set of human users (at the attacker’s disposal), or automatically determined by some image processing algorithms.  For automated attack, 8% passwords were cracked within 232 guesses.
  • 40. 40 Alert: dictionary attack comes back! - Amirali Salehi-Abari, Julie Thorpe, and P.C. van Oorschot, “On Purely Automated Attacks and Click-Based Graphical Passwords,” in Proc. ACSAC’2008, IEEE Computer Society An improved dictionary attack: 16% passwords cracked using a dictionary of less than 231.4 entries.
  • 41. 41 Alert: dictionary attack comes back! - P.C. van Oorschot, Amirali Salehi-Abari and Julie Thorpe, “Purely Automated Attacks on PassPoints-Style Graphical Passwords,” IEEE Trans. Information Forensics and Security, 5(3), 2010 Improved dictionary attacks: 7-16% passwords cracked using a dictionary of 226 entries, 48-54% passwords using a dictionary of 235 entries.
  • 42. 42 Alert: dictionary attack comes back! - Krzysztof Golofit, “Click Passwords Under Investigation,” in Proc. ESORICS’2007, Springer
  • 43. 43 Alert: dictionary attack comes back! - Julie Thorpe, P.C. van Oorschot, “Graphical Dictionaries and the Memorable Space of Graphical Passwords,” in Proc. USENIX Security Symposium 2004 - Mirror symmetric DAS passwords are used to construct a dictionary The sub-password-space is exponentially smaller than the full space.
  • 44. 44 Alert: dictionary attack comes back! - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu, “On the Security of Picture Gesture Authentication,” in Proc. USENIX Security Symposium 2013 - 10K Windows 8 Picture passwords were collected from 800 users. - A training based approach: 24% of passwords cracked in one database with a dictionary of size is 219 (total password space 231).
  • 45. 45 Alert: usability problems! - Karen Renauda and Antonella De Angeli, “My password is here! An investigation into visuo-spatial authentication mechanisms,” Interacting with Computers, vol. 16, pp. 1017-1041, Elsevier, 2004 - Problem 1: the incredible difficulty related to choosing the background image. - Problem 2: the user’s difficulty in pin-pointing a good pass- point. -  “The cognitive aspects of visual information processing would appear to make the use of spatial position untenable for authentication systems.” 45
  • 46. 46 What have we learned? - Textual passwords are bad. - Graphical passwords haven’t been proven as a (much) better replacement. - There is still a long way ahead before we find a real replacement of the current bad textual passwords. - For serious applications, moving to hardware seems to the be most sensible choice.
  • 48. 48 Starter 1: SONY CAPTCHA - CAPTCHA @ SONY web forum (2011) - In Google Chrome 21.0.1180.75 m: - In Mozilla Firefox 15.0.1: - In MSIE 9.0.8.112.16421: - It is obviously weak, but…
  • 49. 49 Starter 2: an e-banking CAPTCHA - CAPTCHA @ a Chinese bank’s e-banking login Web page - In all web browsers: - It seems to be better than the previous one, but is not really strong. However, the simplest way of breaking it is … 5555555555555555555555555555555555555555555455555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555551555545555555455555555555555555555555555555555555555555555555 5555555555555555555555555555555555555511555555555554555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555115555555555555555555555555555555555000000005555555555555555555 5555545555555555555555555555554155555115555555555555333555555555555555500000000005555555555555555555 5555544222225555555555555555511445551155555555555555333333555555555555505555550005555555555555555555 5555542222222255555555555555551114551155555555555555333333335555555555555555500055555555555555555555 5555522255552255555555555555551111511555555555555553335555333555555555555555500055555555555555555555 5555522255552225555555555455555111511555555555555553335555333555555555555555000555555555555555555555 5555522255455222555555555545555111115555555555555553335555333555555555555555000455555555555555555555 5555522254445222555555555554555511115555555555555553333333333555555555555550005555555555555555555555 5555552225555222555555555555455511155555555555555553333333355555555555555550005555555555555555555555 5555552222552222555555555555555551155555555555555553335533355555555555555500005555555554555555555555 5555555522222222555555555555555551155555555555555553335553335555555555555500055555555445555555555555 5555555555555222555555555555555511155555555555555553335555333555555555555000055555554555555555555555 5555555555555222555555555555555511155555555555555553335555333555555555555000555500055555555555555555 5555555555555222555555555444455511155555555555555533335553333555555555544000000000055555555555555555 5555555254452225555555555555555511155555555555555553333333333555555555555440005555555555555555555555 5555555222222225555555555555555515555555555555555555555333335555555555555555555555555555555555555555 5555555552222555555555555555555555555555555555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555 5455555555555555555555555555555555555555544455555555555555555555555555555555555555555555555555555555 5545555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555455555 5545555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555455555 5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555545555 5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555545555 5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555554555 5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555
  • 50. 50 Starter 3: CAPTCHA @ a Chinese site - “Input the result of executing the above code ________ refresh the page to get other code”.
  • 51. 51 More starters: top 10 worst CAPTCHAs - No. 1: - No. 2: - No. 3:
  • 52. Usable Security Captchas (or CAPTCHAs): A Brief Introduction
  • 53. 53 What are Captchas (or CAPTCHAs)? - CAPTCHA - Completely Automated Public Turing test to tell Computers and Humans Apart - It was proposed to fight against automated programs abusing web resources (e.g. spamming). I am human! Then solve this!
  • 54. 54 CAPTCHA has many names! - CAPTCHA: A Turing test? - Automated Turing Test? – The human interrogator in a Turing test is automated by a computer. - Reversed Turing Test? – The role of something (human interrogator) is reversed in a Turing test. - CAPTCHA = HIP (Human Interactive Proof)? - Historically, Blum et al. coined the term HIP to cover many human-involved security systems including CAPTCHA and HumanOID. - So, CAPTCHA  HIP. - CAPTCHA = Authentication code? - …
  • 55. 55 CAPTCHA: before the term was coined - Moni Naor, Verification of a human in the loop or identification via the Turing test, 1996 - , “Add-URL” web page, protected by a scheme later known as CAPTCHA, 1997 - US Patent 6195698, Method for selectively restricting access to computer systems, filed on 13 April, 1998, issued on 27 February, 2001 - Jun Xu, Richard Lipton and Irfan Essa, Hello, Are You Human? Georgia Institute of Technology College of Computing Technical Report, GIT-CC-00-28, 13 November 2000
  • 56. 56 CAPTCHA: after the term was coined - 2000: Udi Manber from described the “chat room problem” to Manuel Blum at the UC Berkeley (who later moved to the CMU). - 2000-2003: Blum and his collaborators coined the term “CAPTCHA” and proposed some early designs at www.captcha.net. - 2002: the first report on breaking CAPTCHAs appeared. - 2002 onwards: a new kind of cat-and-mouse game…
  • 57. 57 CAPTCHAs everywhere - Many (most?) user registration web pages are protected by CAPTCHAs. - Many login pages and web forms as well.
  • 58. 58 CAPTCHAs everywhere - CAPTCHA (reCAPTCHA) has been used for digitizing books by Google.
  • 59. 59 CAPTCHAs everywhere - CAPTCHA has been used as a new advertising platform as well!
  • 60. 60 CAPTCHAs everywhere - SweetCaptcha - PlayThru - MotionCAPTCHA
  • 63. 63 Insecure but usable CAPTCHAs - Almost all (if not all) e-banking CAPTCHAs [S. Li et al. ACSAC 2010]
  • 64. 64 Strong but less usable CAPTCHAs - Google CAPTCHA (not reCAPTCHA) - Simplest are not very hard to solve - Averagely OK? - Some are very hard (if not impossible) to solve - Google has replaced this CAPTCHA by reCAPTCHA for user registration, but still keep it for login (only after three continuous login errors occur).
  • 65. 65 CAPTCHA security mixed with usability - Attackers are recruiting humans to do the job!
  • 66. 66 CAPTCHA security mixed with usability - Attackers also know how to recruit humans without even paying them a penny (since 2007)!
  • 67. 67 Questions about CAPTCHAs - Can we finally find a CAPTCHA scheme with a better balance between security and usability? - Can security and usability be measured automatically? - Do we have any alternative solutions to the problem? - Cost-based proof-of-work (PoW) protocols? - CAPTCHA + (Behavioural) Biometrics? - CAPTCHA + BMI (brain-machine interface)? - …
  • 69. 69 Usable security research - New forms of graphical passwords - Pass-Maps: passwords on world maps - New hardware based user authentication schemes - Lower costs, simpler HCI, less system requirements, … - New user authentication scheme secure against observers - Observers = shoulder-surfers, hidden cameras, keyloggers, screen scrapers, malware, … - Automated security and usability evaluation - Human simulators, crowdsourcing, formal methods, …
  • 70. 70 Usable security research - New password management frameworks - Password policies: Organization vs. Individual - Human factor vs. Trust management - Why should users trust a piece of software? - Password cracking - Discovery of new rules - Modeling of human behaviour - Password strength measurement - Security visualization - Better visualization of passwords?
  • 71. 71 Usable security research - Privacy management - Privacy vs. Security - User privacy vs. Digital forensics - Economic modeling of computer security systems and related human behaviour - Business model vs. Mental model - End users vs. Cyber criminals - Underground economy - Human factors and their impact on security of e- payment systems - Does NFC based banking bring new security problems?
  • 72. 72 Usable security research - Impact of mobile computing on usable security - Enhanced mobility = Better usability = Worse security? - Usability and security of mobile banking systems - Usability and security issues in smart homes - Smart grid and meters - Smart TV (e.g. TV banking) - Usability and security of physical-cyber systems - Internet of Things - Car security - Medical and health devices - …
  • 73. Usable Security Thanks for your attention! Questions + Answers  Collaborations?

Notas do Editor

  1. So from the center of London, you need only less than a hour to the Department of Computing, University of Surrey!
  2. In the late 20th century, he was convicted of various computer and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States. At age 12, Mitnick used social engineering to bypass the punchcard system used in the Los Angeles bus system. After a friendly bus driver told him where he could buy his own ticket punch, he could ride any bus in the greater LA area using unused transfer slips he found in the trash. Social engineering became his primary method of obtaining information, including user-names and passwords and modem phone numbers.[3] Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years. Mitnick served five years in prison — four and a half years pre-trial and eight months in solitary confinement — because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone"[7] meaning that law enforcement told the judge that he could somehow dial into the NORAD modem via a payphone from prison and communicate with the modem by whistling to launch nuclear missiles.[8] He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. Mitnick fought this decision in court, eventually winning a ruling in his favor, allowing him to access the Internet. Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years. Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy. According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended on February 15, 1995 in Raleigh, North Carolina.[4] He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification.[5]
  3. Vishing = voice phishing (phishing over voice)
  4. Weak distributors may choose to exclude one security-oriented component to make their distributions more competitive in the market in term of price.
  5. Privacy may be covered by confidentiality.
  6. Costs include but not limited to: hardware costs, software costs, management and maintenance costs, training costs, personnel costs (e.g. a technician may be needed), time consumed by users on the systems to do a particular task.
  7. Let’s look at some examples.
  8. Exactly 30 years ago…
  9. Around 20 years ago…
  10. Four years ago…
  11. Rule based approach, hybrid approach, …
  12. All of them have some usability problems. We will focus on graphical passwords to show it’s not trivial to have a better solution.
  13. Vicent William van Gogh (1853-1890): Starry, Starry Night
  14. Actually, as you have already seen, Chinese characters are also pictures 
  15. Observed click points.
  16. Observed click points.
  17. Are they (partially) solved by pass-fractals?
  18. Weak developer.
  19. Weak developer.
  20. Weak developer.
  21. HumanOID = Human user authentication when the human is naked in a glass house 
  22. Moni Naor is a former PhD student of Manuel Blum. The cat-and-mouse game is expected as CAPTCHA was the lazy way of how cryptographers do AI.
  23. Can’t find where they use CAPTCHAs? You need a second thought 
  24. The boundary between security and usability is mixed. To prevent human solver based attacks, we would like CAPTCHAs to be not very easy, so ideally be moderate hard. This is another balance!
  25. It is also possible to recruit users if the attacker is the owner of a legitimate web site with a large volume of visits.