skip to main content
10.1145/2702123.2702365acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks

Published: 18 April 2015 Publication History

Abstract

We propose an effective pattern lock strength meter to help users choose stronger pattern locks on Android devices. To evaluate the effectiveness of the proposed meter with a real world dataset (i.e., with complete ecological validity), we created an Android application called EnCloud that allows users to encrypt their Dropbox files. 101 pattern locks generated by real EnCloud users were collected and analyzed, where some portion of the users were provided with the meter support. Our statistical analysis indicates that about 10% of the pattern locks that were generated without the meter support could be compromised through just 16 guessing attempts. As for the pattern locks that were generated with the meter support, that number goes up to 48 guessing attempts, showing significant improvement in security. Our recommendation is to implement a strength meter in the next version of Android.

Supplementary Material

suppl.mov (pn1221.mp4)
Supplemental video

References

[1]
Adams, A., and Sasse, M. A. Users are not the enemy. Communications of the ACM 42, 12 (1999).
[2]
Amitay, D. Most Common iPhone Passcodes. http://amitay.us/blog/files/most_common_iphone_ passcodes.php, 6 (2011).
[3]
Andriotis, P., Tryfonas, T., and Oikonomou, G. Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method. Springer, (2014).
[4]
Biddle, R., Chiasson, S., and Van Oorschot, P. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys 44, 4 (2012), 1--41.
[5]
Bonneau, J. Guessing human-chosen secrets. PhD thesis, University of Cambridge, (2012).
[6]
Bonneau, J. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In Proceedings of Security and Privacy (SP), IEEE (2012).
[7]
Castelluccia, C., Dürmuth, M., and Perito, D. Adaptive password-strength meters from markov models. In Proceedings of Network and Distributed Systems Security Symposium (2012).
[8]
Davis, D., Monrose, F., and Reiter, M. K. On user choice in graphical password schemes. In Proceedings of USENIX Security Symposium (2004).
[9]
de Carné de Carnavalet, X., and Mannan, M. From very weak to very strong: Analyzing password-strength meters. In Proceedings of Network and Distributed System Security Symposium (2013).
[10]
De Luca, A., Langheinrich, M., and Hussmann, H. Towards understanding atm security: a field study of real world atm use. In Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS), ACM (2010).
[11]
Dirik, A. E., Memon, N., and Birget, J.-C. Modeling user choice in the passpoints graphical password scheme. In Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), ACM (2007).
[12]
Dunphy, P., and Yan, J. Do background images improve draw a secret graphical passwords? In Proceedings of the 14th ACM conference on Computer and Communications Security (CCS), ACM (2007).
[13]
Egelman, S., Sotirakopoulos, A., Muslukhov, I., Beznosov, K., and Herley, C. Does my password go up to eleven? the impact of password meters on password selection. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (HFCS), ACM (2013).
[14]
Gao, H., Guo, X., Chen, X., Wang, L., and Liu, X. Yagp: Yet another graphical password strategy. In Proceedings of Computer Security Applications Conference (ACSAC), IEEE (2008).
[15]
Golle, P., and Wagner, D. Cryptanalysis of a cognitive authentication scheme. In Proceedings of Security and Privacy (SP), IEEE (2007).
[16]
Jermyn, I., Mayer, A. J., Monrose, F., Reiter, M. K., Rubin, A. D., et al. The design and analysis of graphical passwords. In Proceedings of USENIX Security Symposium (1999).
[17]
Kim, H., and Huh, J. H. PIN selection policies: Are they really effective? Computers & Security 31, 4 (2012), 484--496.
[18]
Massey, J. L. Guessing and entropy. In Proceedings of Information Theory, IEEE (1994).
[19]
Narayanan, A., and Shmatikov, V. Fast dictionary attacks on passwords using time-space tradeoff. In Proceedings of the 12th ACM conference on Computer and Communications Security (CCS), ACM (2005).
[20]
Shannon, C. E. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review 5, 1 (2001), 3--55.
[21]
Song, Y., Kim, H., and Mohaisen, A. A private walk in the clouds: Using end-to-end encryption between cloud applications in a personal domain. In Proceedings of Trust, Privacy, and Security in Digital Business. Springer, 2014, 72--82.
[22]
Standing, L., Conezio, J., and Haber, R. N. Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychonomic Science 19, 2 (1970), 73--74.
[23]
Tao, H., and Adams, C. Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. International Journal of Network Security 7, 2 (2008), 273--292.
[24]
Thorpe, J., and van Oorschot, P. C. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of USENIX Security Symposium (2007), 103--118.
[25]
Uellenbeck, S., Dürmuth, M., Wolf, C., and Holz, T. Quantifying the security of graphical passwords: the case of android unlock patterns. In Proceedings of the 20th ACM conference on Computer and Communications Security (CCS), ACM (2013).
[26]
Ur, B., Kelley, P. G., Komanduri, S., Lee, J., Maass, M., Mazurek, M. L., Passaro, T., Shay, R., Vidas, T., Bauer, L., Christin, N., and Cranor, L. F. How does your password measure up? the effect of strength meters on password creation. In Proceedings of USENIX Security Symposium (2012).
[27]
Varenhorst, C., Kleek, M., and Rudolph, L. Passdoodles: A lightweight authentication method. Research Science Institute (2004).
[28]
von Zezschwitz, E., Dunphy, P., and De Luca, A. Patterns in the wild: A field study of the usability of pattern and pin-based authentication on mobile devices. In Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI), ACM (2013).
[29]
Zakaria, N. H., Griffiths, D., Brostoff, S., and Yan, J. Shoulder surfing defence for recall-based graphical passwords. In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS), ACM (2011).

Cited By

View all

Index Terms

  1. On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
    April 2015
    4290 pages
    ISBN:9781450331456
    DOI:10.1145/2702123
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 April 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. password
    2. password strength meter
    3. pattern lock
    4. security

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CHI '15
    Sponsor:
    CHI '15: CHI Conference on Human Factors in Computing Systems
    April 18 - 23, 2015
    Seoul, Republic of Korea

    Acceptance Rates

    CHI '15 Paper Acceptance Rate 486 of 2,120 submissions, 23%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)30
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media