Abstract
Upcoming mobile devices will have flexible displays, allowing us to explore alternate forms of user authentication. On flexible displays, users can interact with the device by deforming the surface of the display through bending. In this paper, we present Bend Passwords, a new type of user authentication that uses bend gestures as its input modality. We ran three user studies to evaluate the usability and security of Bend Passwords and compared it to PINs on a mobile phone. Our first two studies evaluated the creation and memorability of user-chosen and system-assigned passwords. The third study looked at the security problem of shoulder-surfing passwords on mobile devices. Our results show that bend passwords are a promising authentication mechanism for flexible display devices. We provide eight design recommendations for implementing Bend Passwords on flexible display devices.











Similar content being viewed by others
Notes
Shoulder-surfing is an attack where malicious users learn a password by observing its entry on the device. These attacks are common in public places such as bus stops and coffee shops.
Parts of this user study were published as a poster with an extended abstract [56].
Parts of this user study were published as a poster with an extended abstract [57].
References
Mobile Technology Fact Sheet (2014) http://www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/. Accessed on 09 July 2015
Adams A, Sasse MA (1999) Users are not the enemy. Commun ACM 42(12):40–46
Beust C (2008) Cedric’s weblog: Android’s locking pattern. http://beust.com/weblog2/archives/000497.html. Accessed on 09 July 2015
Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. In: Proceedings of the conference on offensive technologies, 2010, pp 1–7
Agomuoh F (2014) Samsung flexible display phone coming in 2015? http://www.ibtimes.com/samsung-flexible-display-phone-coming-2015-manufacturer-secretly-showcases-foldable-amoled-display. Accessed on 09-July 2015
Kildal J, Paasovaara S, Aaltonen V (2012) Kinetic device: designing interactions with a deformable mobile interface. In: Proceedings of the 30th SIGCHI conference on human factors in computing systems extended abstracts (CHI-EA), 2012, pp 1871–1876
Lahey B, Girouard A, Burleson W, Vertegaal R (2011) PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays. In: Proceedings of the 29th SIGCHI conference on human factors in computing systems, 2011, pp 1303–1312
Schwesig C, Poupyrev I, Mori E (2004) Gummi: a bendable computer. In: Proceedings of the 22nd SIGCHI conference on human factors in computing systems, 2004, pp 263–270
Watanabe J, Mochizuki A, Horry Y (2008) Bookisheet: bendable device for browsing content using the metaphor of leafing through the pages. In: Proceedings of the 10th international conference on ubiquitous computing, 2008, pp 360–369
Wightman D, Ginn T, Vertegaal R (2011) BendFlip: examining input techniques for electronic book readers with flexible form factors. In: Proceedings of the 13th IFIP TC13 conference on human-computer interaction, 2011, pp 117–133
Warren K, Lo J, Vadgama V, Girouard A (2013) Bending the rules: bend gesture classification for flexible displays. In: Proceedings of the 31st SIGCHI conference on human factors in computing systems, 2013, pp 607–610
Ye Z, Khalid H (2010) Cobra: flexible displays for mobile gaming scenarios. In: Proceedings of the 28th SIGCHI conference on human factors in computing systems extended abstracts, 2010, pp 4363–4367
Burstyn J, Banerjee A, Vertegaal R (2012) FlexView: an evaluation of depth navigation on deformable mobile devices. In: Proceedings of the 6th conference on tangible, embedded, embodied interaction, 2012, pp 193–200
Lee S-S, Kim S, Jin B, Choi E, Kim B, Jia X, Kim D, Lee K (2010) How users manipulate deformable displays as input devices. In: Proceedings of the 28th SIGCHI conference on human factors in computing systems, 2010, pp 1647–1656
Kildal J, Lucero A, Boberg M (2013) Twisting touch: combining deformation and touch as input within the same interaction cycle on handheld devices. In: Proceedings of the international conference on human-computer interaction with mobile devices and services, 2013, pp 237–246
Steimle J, Jordt A, Maes P (2013) Flexpad: highly flexible bending interactions for projected handheld displays. In: Proceedings of the 31st SIGCHI conference on human factors in computing systems, 2013, pp 237–246
Girouard A, Lo J, Riyadh M, Daliri F, Eady AK, Pasquero J (2015) One-handed bend interactions with deformable smartphones. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems, 2015, pp 1509–1518
Saltzer J, Schroeder M (1975) The protection of information in computer systems. In: Proceedings of the 4th symposium on operating system principles, 1975, vol 63, Issue 9, pp 1278–1308
Yan J, Anderson R, Grant A (2005) The memorability and security of passwords. In: Cranor L, Garfinkel S (eds) O’Reilly media, pp 129–142
Rogers J (2007) Please enter your 4-digit PIN. Financ. Serv. Technol. US Ed., no. 4
Schaub F, Deyhle R, Weber M (2012) Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th international conference on mobile and ubiquitous multimedia, 2012, pp 13:1–13:10
von Zezschwitz E, De Luca A, Hussmann H (2014) Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance. In: Proceedings of the 8th nordic conference on human-computer interaction: fun, fast, foundational, 2014, pp 461–470
von Zezschwitz E, Dunphy P, De Luca A (2013) Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. In: Proceedings of the 15th international conference on human-computer interaction with mobile devices and services, 2013, pp 261–270
De Luca A, Harbach M, von Zezschwitz E, Maurer M-E, Slawik BE, Hussmann H, Smith M (2014) Now you see me, now you don’t: protecting smartphone authentication from shoulder surfers. In: Proceedings of the 32nd SIGCHI conference on human factors in computing systems, 2014, pp 2937–2946
Harbach M, von Zezschwitz E, Fichtner A, De Luca A, Smith M (2014) It’s a hard lock life: a field study of smartphone (un) locking behavior and risk perception. In: Symposium on usable privacy and security (SOUPS), 2014
Apple’s TouchID (2015) https://www.apple.com/ca/iphone-6/touch-id/. Accessed on 09 July 2015
Kit (2015) Try face unlock. https://support.google.com/nexus/answer/2781894?hl=en-CA. Accessed on 09 July 2015
Bianchi A, Oakley I, Lee JK, Kwon DS (2010) The haptic wheel: design and evaluation of a tactile password system. In: Proceedings of the 28th SIGCHI conference on human factors in computing systems extended abstracts, 2010, pp 625–630
Bianchi A, Oakley I, Kwon DS (2010) The secure haptic keypad: a tactile password system. In: Proceedings of the 28th SIGCHI conference on human factors in computing systems, 2010, pp 1089–1092
Mott M, Donahue T, Poor GM, Leventhal L (2012) Leveraging motor learning for a tangible password system. In: Proceedings of the 30th SIGCHI conference on human factors in computing systems extended abstracts, 2012, pp 2597–2602
Jain A, Hong L, Pankanti S (2000) Biometric identification. Commun ACM 43(2):90–98
Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur 5(4):367–397
Chong MK, Marsden G, Gellersen H (2010) GesturePIN: using discrete gestures for associating mobile devices. In: Proceedings of the international conference on human computer interaction with mobile devices and services, 2010, pp 261–264
Shahzada S, Chiasson S, Biddle R (2014) Gesture authentication for mobile devices. In: Who are you?! Adventures in authentication: WAY workshop, 2014, pp 1–2
De Luca A, Von Zezschwitz E, Nguyen NDH, Maurer M-E, Rubegni E, Scipioni MP, Langheinrich M (2013) Back-of-device authentication on smartphones. In: Proceedings of the 31st SIGCHI conference on human factors in computing systems, 2013, pp 2389–2398
Biddle R, Chiasson S, Van Oorschot PC (2012) Graphical passwords: learning from the first twelve years. ACM Comput Surv 44(4):19:1–19:41
Faulkner L (2003) Beyond the five-user assumption: benefits of increased sample sizes in usability testing. Behav Res Methods Instrum Comput 35(3):379–383
Florêncio D, Herley C, Coskun B (2007) Do strong web passwords accomplish anything? In: Proceedings of the 2nd USENIX workshop on hot topics in security, 2007, pp 10:1–10:6
Tari F, Ozok AA, Holden SH (2006) A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the 2nd symposium on usable privacy and security, 2006, pp 56–66
Bonneau J (2012) The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: Proceedings of the symposium on security and privacy, 2012, pp 538–552
Dell’Amico M, Michiardi P, Roudier Y (2010) Password strength: an empirical analysis. In: Proceedings of the 29th conference on information communications (INFOCOM), 2010, pp 983–991
Florencio D, Herley C (2007) A large-scale study of web password habits. In: Proceedings of the international conference on world wide web (WWW), 2007, pp 657–666
Inglesant PG, Sasse MA (2010) The true cost of unusable password policies: password use in the wild. In: Proceedings of the 28th SIGCHI conference on human factors in computing systems, 2010, pp 383–392
Riley S (2006) Password security: what users know and what they actually do. Usability News 8(1):2833–2836
Zviran M, Haga WJ (1999) Password security: an empirical study. J Manag Inf Syst 15(4):161–185
Shay R, Komanduri S, Kelley PG, Leon PG, Mazurek ML, Bauer L, Christin N, Cranor LF (2010) Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 6th symposium on usable privacy and security, 2010, pp 2:1–2:20
Weir M, Aggarwal S, Collins M, Stern H (2010) Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM conference on computer and communications security, 2010, pp 162–175
Ur B, Kelley PG, Komanduri S, Lee J, Maass M, Mazurek ML, Passaro T, Shay R, Vidas T, Bauer L, Christin N, Cranor LF (2012) How does your password measure up? The effect of strength meters on password creation. In Proceedings of the 21st USENIX conference on security symposium, 2012, p 5
Egelman S, Sotirakopoulos A, Muslukhov I, Beznosov K, Herley C (2013) Does my password go up to eleven? The impact of password meters on password selection. In: Proceedings of the 31st SIGCHI conference on human factors in computing systems, 2013, pp 2379–2388
Kildal J, Wilson G (2012) Feeling it: the roles of stiffness, deformation range and feedback in the control of deformable UI. In: Proceedings of the 14th ACM international conference on multimodal interaction, 2012, pp 393–400
Eichenbaum H (2011) The cognitive neuroscience of memory: an introduction. Oxford University Press, Oxford
Baars BJ (1986) A cognitive theory of consciousness. Cambridge University Press, Cambridge
Schaub F, Walch M, Könings B, Weber M (2013) Exploring the design space of graphical passwords on smartphones. In: Proceedings of the 9th symposium on usable privacy and security, 2013, pp 11:1–11:14
Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Sov Phys Dokl 10(8):707–710
Hansen WJ (1971) User engineering principles for interactive systems. In: Proceedings of the fall joint computer conference, 1971, pp 523–532
Maqsood S, Chiasson S, Girouard A (2013) Poster: passwords on flexible display devices. In: Proceedings of the SIGSAC conference on Computer & communications security (CCS), 2013, pp 1469–1472
Maqsood S (2014) Poster: shoulder surfing susceptibility of bend passwords. In: Proceedings of the SIGCHI conference on human factors in computing systems extended abstracts (CHI-EA), 2014, pp 915–920
Acknowledgments
This work was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC). Sonia Chiasson holds a Canada Research Chair in Human Oriented Computer Security and acknowledges funding for the Chair and Discovery Grants. Audrey Girouard also acknowledges funding for her Discovery Grant. The authors also acknowledge funding from NSERC ISSNet.
Author information
Authors and Affiliations
Corresponding author
Appendix
Rights and permissions
About this article
Cite this article
Maqsood, S., Chiasson, S. & Girouard, A. Bend Passwords: using gestures to authenticate on flexible devices. Pers Ubiquit Comput 20, 573–600 (2016). https://doi.org/10.1007/s00779-016-0928-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-016-0928-6