skip to main content
10.1145/2046642.2046652acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Johnny in internet café: user study and exploration of password autocomplete in web browsers

Published:21 October 2011Publication History

ABSTRACT

One of the most popular aids adopted by users to reduce the pain suffered from the use of passwords is browsers' autocomplete feature. This feature, caching username and password after getting the user consent and using them later for automatic completion, is available in all modern browsers but communication with the user asking consent is implemented in different ways. In this paper, we report on user studies comparing active communication with a blocking dialog box and passive communication with a non-intrusive toolbar. We found that a dialog box misled users to save passwords in public computers. Conversely, no security problem was observed with passive communication. Our exploration provides empirical evidence for the risks of preferring active communication for password autocomplete and other similar interactions and sheds light on many other aspects of password autocomplete.

References

  1. Browser Market Share, http://marketshare.hitslink.com/report.aspx?qprid=0, last accessed on 02/July/2011.Google ScholarGoogle Scholar
  2. L.F.Cranor: A framework for reasoning about the human in the loop. In Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1--15, Berkeley, CA, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Dhamija, J.D. Tygar, and M. Hearst. Why phishing works. In Proc. of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581--590, New York, NY, USA, 2006, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Florencio and C. Herley. A large-scale study of web password habits. In Proc. of WWW (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Gaw, E.W. Felten, Password management strategies for online accounts, in: SOUPS '06, ACM Press, 2006, pp. 44--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Peter Gutmann: Security usability, http://www.cs.auckland.ac.nz/~pgut001/pubs/usability.pdf, February 2008. Draft. Last accessed on 02/July/2011.Google ScholarGoogle Scholar
  7. E. Hayashi and J.I. Hong. A diary study of password usage in daily life, In Proc. of CHI 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Heilman. Web Security: Are you part of the problem. White paper, http://coding.smashingmagazine.com/2010/01/14/web-security-primer-are-you-part-of-the-problem/, last accessed on 02/July/2011.Google ScholarGoogle Scholar
  9. C. Herley, P.C. van Oorschot and A.S. Patrick. Passwords: If We're So Smart Why Are We Still Using Them? Proc. Financial Crypto 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Morris and K. Thompson. Password security: a case history. Communications of the ACM, 22:594--597, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Nodder: Users and trust: A microsoft case study. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, August 2005.Google ScholarGoogle Scholar
  12. Kevin Purdy, post to lifehacker.com, Available at http://lifehacker.com/5431466/autocomplete-extension-makes-chrome-save-nearly-any-password, last accessed on 02/July/2011.Google ScholarGoogle Scholar
  13. Portable Firefox project, available at http://portablefirefox.mozdev.org/, last accessed on 02/July/2011.Google ScholarGoogle Scholar
  14. PTFB Pro Mouse AutoClicker and Macro Recorder, http://www.ptfbpro.com, last accessed on 02/July/2011.Google ScholarGoogle Scholar
  15. B.Ross: Firefox and the worry free web. In L.F. Cranor and S.Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, August 2005.Google ScholarGoogle Scholar
  16. Brent Strange, Password harvesting with AutoComplete, available at http://www.testingreflections.com/node/view/3482, last accessed on 02/July/2011.Google ScholarGoogle Scholar
  17. Usage share of web browsers, http://en.wikipedia.org/wiki/Usage_share_of_web_browsersGoogle ScholarGoogle Scholar
  18. Walker News, Why IE8 Displays Security Warning When Loading HTTPS Page?, http://www.walkernews.net/2009/10/19/why-ie8-displays-security-warning-when-loading-https-page/.Google ScholarGoogle Scholar
  19. Alma Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, pages 169 -- 184. Usenix, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Windows XP, http://en.wikipedia.org/wiki/Windows_XPGoogle ScholarGoogle Scholar

Index Terms

  1. Johnny in internet café: user study and exploration of password autocomplete in web browsers

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      DIM '11: Proceedings of the 7th ACM workshop on Digital identity management
      October 2011
      102 pages
      ISBN:9781450310062
      DOI:10.1145/2046642

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 October 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate16of34submissions,47%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader