skip to main content
10.1145/2212776.2223737acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

A security assessment of tiles: a new portfolio-based graphical authentication system

Published: 05 May 2012 Publication History

Abstract

In this paper we propose Tiles, a graphical authentication system in which users are assigned a target image and subsequently asked to select segments of that image. We assess the extent to which this system provides protection against two security threats: observation attacks and sharing of authentication credentials in two laboratory-based studies. We note some of the vulnerabilities of the new system but provide evidence that automated manipulation of the similarity of the decoy images can help mitigate the threat from verbal sharing and observation attacks.

References

[1]
Angeli, A. De, Coutts, M., Coventry, L., Johnson, G., Cameron, D., and Fischer, M. VIP: a visual approach to user authentication. In Proc. of AVI (2002), 316--323.
[2]
Baddeley, A. Human Memory: Theory and Practice. Psychology Press, 1997.
[3]
Dunphy, P., Heiner, A., and Asokan, N. A closer look at recognition-based graphical passwords on mobile devices. In Proc. of SOUPS (2010).
[4]
Dunphy, P., Nicholson, J., and Olivier, P. L. Securing Passfaces for Description. In Proc. Of SOUPS (2008), 24--35.
[5]
Florencio, D. and Herley, C. A large-scale study of web password habits. In Proc. of WWW (2007), 657--666.
[6]
Sasse, M. A., Brostoff, S., and Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19, 3 (2001), 122--131.
[7]
Tari, F., Ozok, A., and Holden, S. H. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In Proc. of SOUPS (2006), 56--66.
[8]
Tullis, T. S. and Tedesco, D. P. Using personal photos as pictorial passwords. In Proc. of CHI (2005), 1841--1844.
[9]
Tullis, T. S., Tedesco, D. P., and McCaffrey, K. E. Can users remember their pictorial passwords six years later. In Proc. of CHI (2011), 1789--1794.
[10]
Wiedenbeck, S., Waters, J., Sobrado, L., and Birget, J. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proc. of AVI (2006), 177--184.

Cited By

View all

Index Terms

  1. A security assessment of tiles: a new portfolio-based graphical authentication system

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems
      May 2012
      2864 pages
      ISBN:9781450310161
      DOI:10.1145/2212776

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 May 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. authentication
      2. graphical authentication systems
      3. graphical passwords
      4. shoulder surfing
      5. usable security

      Qualifiers

      • Extended-abstract

      Conference

      CHI '12
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media