Title: Undercover: Authentication Usable in Front of Prying Eyes
1Undercover Authentication Usable in Front of
Prying Eyes
- Hirokazu Sasamoto
- Nicolas Christin
- Eiji Hayashi
- Carnegie Mellon CyLab Japan
2- Overview
- Concept
- Design
- Evaluation
3- Overview
- Concept
- Design
- Evaluation
4(No Transcript)
5Actual Observation Attack
Camcorder
6Problem to address
- Observation attack stealing authentication token
by observing users behavior. - Example of instances
- Eavesdropping
- Shoulder surfing
- Spyware
- Far from being limited to ATM devices!
7Observation is,
- Easy to carry out
- Difficult to prevent, and
- Effective circumvention of authentication system
8(No Transcript)
9Related works
- Cognitive trapdoor gameRoth et al., 2004
- Convex Hull Click SchemeWiedenbeck et al., 2006
- Cognitive Authentication SchemesWeinshall et
al., 2006
10Cognitive trapdoor game
A PIN entry method resilient against shoulder
surfing., V. Roth et al, Computer and
Communications Security, 2004.
11Convex Hull Click Scheme
Design and Evaluation of a Shoulder-Surfing
Resistant Graphical Password Scheme, S.
Wiedenbeck et al, Proceedings of the working
conference on Advanced visual interfaces, 2006
12- Overview
- Concept
- Design Process
- Evaluation
13Current Solution to Observation Attack
Authentication System
Generate Challenge
User
Generate Response
14Proposed Solution to Observation Attack
Authentication System
Generate Challenge
User
Generate Response
15Simple Analogy
Is the first digit of your secret code is 1?
Yes
No
Tell a lie
?
Authentication System
User
Attacker
16Challenge
- Designing hidden channel is key
17- Overview
- Concept
- Design
- Evaluation
18Designing Hidden Channel
- Requirements
- Should be hidden from an observer
- Should be easy to acquire by a legitimate user
- Should convey enough information to keep the
number of challenges small - Tactile display meets these requirements best
19Designing Tactile Display
- Contact-based vs. Friction-based ?
- Simplicity vs. of challenge ?
- Decided based on Lo-Fi test
20Contact-based vs. Friction-based
21Simplicity vs. of Challenges
22Undercover
23Undercover Analogy
E
D E A B C
?
Authentication System
User
Attacker
24Authentication Process
25Hidden Channel
26Inside of Tactile Display
27- Overview
- Concept
- Design Process
- Evaluation
28Evaluation Overview
- 38 participants
- Within subject design
- Usability and Security
29Test Procedure
- Training Phase
- 15 min
- Authentication Phase
- Undercover
- Control Phase
- 4 digit secret code
30Test Environment
Camera 2
Laptop
Table
Camera 1
Tactile Device
Participant
31Evaluation
- Usability
- Authentication time
- Failed challenge rate
- Security
- Success rate of observation attack
32Usability
72
32
23
3.2
33Usability
Cited from their papers
4.5
0.6
2.1
N/A
34Security
100
22
N/A
N/A
35Type of Information Leakage
14.7 Pointing the diagram
6.4 Hand movement
0.9 Saying something
532 trials
3.9 Combination
74.1 No leakage
There is no correlation between information
leakage and error rate
36Other Findings in Evaluation
- Usability
- Improving tactile display will reduce
authentication time and decrease error rate - Security
- Education will prevent information leakage while
maintaining current error rates
37Future work
- Design better tactile device
- Reduce authentication time
- Decrease error rate
- Larger usability test
- Evaluate effect of education
38Summary of contributions
- Proposed observation attack resilient
authentication scheme - Showed design procedure of security system
- Performed full evaluation of the system
- Demonstrated humans handle multisensory inputs
well - Demonstrated Undercover is resilient against
powerful observation attacks - No correlation between the information leakage
and error rate
39Thank you for listening
Contact Information