Cargando…

Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches a...

Descripción completa

Detalles Bibliográficos
Autores principales: Ho, Peng Foong, Kam, Yvonne Hwei-Syn, Wee, Mee Chin, Chong, Yu Nam, Por, Lip Yee
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058474/
https://www.ncbi.nlm.nih.gov/pubmed/24991649
http://dx.doi.org/10.1155/2014/838623
_version_ 1782321124445519872
author Ho, Peng Foong
Kam, Yvonne Hwei-Syn
Wee, Mee Chin
Chong, Yu Nam
Por, Lip Yee
author_facet Ho, Peng Foong
Kam, Yvonne Hwei-Syn
Wee, Mee Chin
Chong, Yu Nam
Por, Lip Yee
author_sort Ho, Peng Foong
collection PubMed
description Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack.
format Online
Article
Text
id pubmed-4058474
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-40584742014-07-02 Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information Ho, Peng Foong Kam, Yvonne Hwei-Syn Wee, Mee Chin Chong, Yu Nam Por, Lip Yee ScientificWorldJournal Research Article Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. Hindawi Publishing Corporation 2014 2014-05-27 /pmc/articles/PMC4058474/ /pubmed/24991649 http://dx.doi.org/10.1155/2014/838623 Text en Copyright © 2014 Peng Foong Ho et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Ho, Peng Foong
Kam, Yvonne Hwei-Syn
Wee, Mee Chin
Chong, Yu Nam
Por, Lip Yee
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
title Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
title_full Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
title_fullStr Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
title_full_unstemmed Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
title_short Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
title_sort preventing shoulder-surfing attack with the concept of concealing the password objects' information
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058474/
https://www.ncbi.nlm.nih.gov/pubmed/24991649
http://dx.doi.org/10.1155/2014/838623
work_keys_str_mv AT hopengfoong preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation
AT kamyvonnehweisyn preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation
AT weemeechin preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation
AT chongyunam preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation
AT porlipyee preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation