skip to main content
10.1145/2683467.2683471acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

A Password Manager that Doesn't Remember Passwords

Published:15 September 2014Publication History

ABSTRACT

The problems with passwords are well-known: secure passwords are difficult to remember, users have too many passwords, and users have difficulty matching their passwords to accounts. Password managers and cued graphical passwords are two password solutions that address the issues of memorability and keeping track of of passwords. We have developed Versipass, a password manager that incorporates key elements of password managers and cued graphical passwords to avoid existing problems of password memorability and associating passwords with accounts. Instead of remembering passwords, Versipass remembers image cues for graphical passwords. These cues help users to better remember their passwords and to more easily link passwords with accounts. Versipass also facilitates safe password reuse by allowing users to use the same image cue for multiple accounts.

References

  1. R. Biddle, S. Chiasson, and P. C. van Oorschot. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys, 44(4), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Bonneau, M. Just, and G. Matthews. What's in a Name? In Financial Cryptography and Data Security, pages 98--113. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. Cheswick. Rethinking Passwords. Queue, 10(12), Dec. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Chiasson, C. Deschamps, E. Stobert, M. Hlywa, B. Freitas Machado, A. Forget, N. Wright, G. Chan, and R. Biddle. The MVP Web-based Authentication Framework. In Financial Cryptography and Data Security, pages 1--8, Bonaire, Feb. 2012.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle. Multiple password interference in text passwords and click-based graphical passwords. In CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, USA, Nov. 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. C. van Oorschot. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. IEEE Transactions on Dependable and Secure Computing, 9(2):222--235, Oct. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Chiasson, P. van Oorschot, and R. Biddle. A Usability Study and Critique of Two Password Managers. In 15th USENIX Security Symposium, pages 1--16, Vancouver, Canada, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. F. Wang. The Tangled Web of Password Reuse. In NDSS'14: The Network and Distributed System Symposium, San Diego, USA, 2014.Google ScholarGoogle Scholar
  9. A. De Angeli, L. Coventry, G. Johnson, and K. Renaud. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63(1--2):128--152, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Florêncio and C. Herley. A Large-Scale Study of Web Password Habits. In International World Wide Web Conference Committee (IW3C2), pages 1--9, Banff, Canada, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Florêncio, C. Herley, and P. C. van Oorschot. An Administrator's Guide to Internet Password Research. In USENIX LISA, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Florêncio, C. Herley, and P. C. van Oorschot. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In 23rd USENIX Security Symposium, San Diego, USA, Aug. 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Gaw and E. W. Felten. Password Management Strategies for Online Accounts. In SOUPS'06: Proceedings of the 2nd Symposium on Usable Privacy and Security, Pittsburgh, USA, July 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hacker News. I'm the Chrome browser security tech lead, so it might help if I explain our rea... | Hacker News, 2013. https://news.ycombinator.com/item?id=6166731.Google ScholarGoogle Scholar
  15. E. Hayashi and J. Hong. A diary study of password usage in daily life. In CHI'11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, Canada, May 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Just. Designing and evaluating challenge-question systems. IEEE Security & Privacy, 2(5):32--39, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. A. Norman. When security gets in the way. ACM SIGCSE Bulletin, 16(6):60, Nov. 2009.Google ScholarGoogle Scholar
  18. A. Paivio. Imagery and Verbal Processes. Holt, Rinehart, and Winston, 1971.Google ScholarGoogle Scholar
  19. A. Paivio, T. B. Rogers, and P. C. Smythe. Why are pictures easier to recall than words? Psychonomic Science, 11(4):137--138, 1968.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. Pashalidis and C. J. Mitchell. A Taxonomy of Single Sign-On Systems. In Information Security and Privacy, pages 249--264, Berlin, Heidelberg, June 2003. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. K. Renaud and M. Just. Pictures or questions?: examining user responses to association-based authentication. In BCS'10: Proceedings of the 24th BCS Interaction Specialist Group Conference, pages 98--107, Dundee, UK, 2010. BCS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger Password Authentication Using Browser Extensions. In 14th USENIX Security Symposium, Baltimore, USA, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Schechter, A. J. B. Brush, and S. Egelman. It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions. IEEE Symposium on Security and Privacy, pages 375--390, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Schneier. Write Down Your Password, June 2005. http://www.schneier.com/blog/archives/2005/06/write_down_your.html.Google ScholarGoogle Scholar
  25. E. Stobert and R. Biddle. Memory retrieval and graphical passwords. In SOUPS'13: Proceedings of the 9th Symposium on Usable Privacy and Security, Newcastle, UK, 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov. A billion keys, but few locks. In NSPW'10: The New Security Paradigms Workshop, pages 61--72, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S.-T. Sun, E. Pospisil, I. Muslukhov, N. Dindar, K. Hawkey, and K. Beznosov. What Makes Users Refuse Web Single Sign-On?: An Empirical Investigation of OpenID. In SOUPS'11: Proceedings of the 7th Symposium on Usable Privacy and Security, Washington DC, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. E. Tulving and D. Thomson. Encoding Specificity and Retrieval Processes in Episodic Memory. Psychological Review, 80(5):352--373, Dec. 1973.Google ScholarGoogle Scholar
  29. P. C. van Oorschot and J. Thorpe. Exploiting Predictability in Click-based Graphical Passwords. Journal of Computer Security, 19(4):669--702, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. C. Wharton, J. Rieman, C. Lewis, and P. Polson. The cognitive walkthrough method: A practitioner's guide. In J. Nielsen and R. L. Mack, editors, Usability Inspection Methods, pages 105--140. John Wiley & Sons, Inc., New York, NY, USA, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63(1--2):102--127, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Password Manager that Doesn't Remember Passwords

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      NSPW '14: Proceedings of the 2014 New Security Paradigms Workshop
      September 2014
      148 pages
      ISBN:9781450330626
      DOI:10.1145/2683467

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 September 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      NSPW '14 Paper Acceptance Rate11of32submissions,34%Overall Acceptance Rate62of170submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader