A study on usability and security features of the Android pattern lock screen
Author:
Andriotis Panagiotis,Oikonomou George,Mylonas Alexios,Tryfonas Theo
Abstract
Purpose
– The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a password, which enhance its memorability. Graphical passwords are vulnerable to attacks (e.g. shoulder surfing); thus, the need for more complex passwords becomes apparent. This paper aims to focus on the features that constitute a usable and secure pattern and investigate the existence of heuristic and physical rules that possibly dictate the formation of a pattern.
Design/methodology/approach
– The authors conducted a survey to study the users’ understanding of the security and usability of the pattern lock screen. The authors developed an Android application that collects graphical passwords, by simulating user authentication in a mobile device. This avoids any potential bias that is introduced when the survey participants are not interacting with a mobile device while forming graphical passwords (e.g. in Web or hard-copy surveys).
Findings
– The findings verify and enrich previous knowledge for graphical passwords, namely, that users mostly prefer usability than security. Using the survey results, the authors demonstrate how biased input impairs security by shrinking the available password space.
Research limitations/implications
– The sample’s demographics may affect our findings. Therefore, future work can focus on the replication of our work in a sample with different demographics.
Originality/value
– The authors define metrics that measure the usability of a pattern (handedness, directionality and symmetry) and investigate their impact to its formation. The authors propose a security assessment scheme using features in a pattern (e.g. the existence of knight moves or overlapping nodes) to evaluate its security strengths.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference25 articles.
1. Andriotis, P.
,
Tryfonas, T.
,
Oikonomou, G.
and
Yildiz, C.
(2013), “A pilot study on the security of pattern screen-lock methods and soft side channel attacks”, Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, pp. 1-6. 2. Aviv, A.J.
and
Fichter, D.
(2014), “Understanding visual perceptions of usability and security of Android’s graphical password pattern”, Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC ’14, ACM, New York, NY, pp. 286-295. 3. Aviv, A.J.
,
Gibson, K.
,
Mossop, E.
,
Blaze, M.
and
Smith, J.M.
(2010), “Smudge attacks on smartphone touch screens”, Proceedings of the 4th USENIX Conference on Offensive Technologies, Washington, DC, pp. 1-7. 4. Biddle, R.
,
Chiasson, S.
and
Van Oorschot, P.C.
(2012), “Graphical passwords: learning from the first twelve years”,
ACM Computing Surveys (CSUR
), Vol. 44 No. 4, p. 19. 5. Bonneau, J.
(2012), “The science of guessing: analyzing an anonymized corpus of 70 million passwords”, IEEE Symposium on Security and Privacy (SP), San Francisco, CA, pp. 538-552.
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|