2010
DOI: 10.1109/tifs.2010.2053706
|View full text |Cite
|
Sign up to set email alerts
|

Purely Automated Attacks on PassPoints-Style Graphical Passwords

Abstract: Abstract-We introduce and evaluate various methods for purely automated attacks against PassPoints-style graphical passwords. For generating these attacks, we introduce a graph-based algorithm to efficiently create dictionaries based on heuristics such as click-order patterns (e.g., 5 points all along a line). Some of our methods combine click-order heuristics with focusof-attention scan-paths generated from a computational model of visual attention, yielding significantly better automated attacks than previou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
50
0
2

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 75 publications
(52 citation statements)
references
References 24 publications
0
50
0
2
Order By: Relevance
“…For example, the HOR and V ER dictionaries both contain DIAG as a subset. Further work on click-order patterns is beyond the scope of this paper, and is provided in another paper [30].…”
Section: Click-order Pattern Attack Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the HOR and V ER dictionaries both contain DIAG as a subset. Further work on click-order patterns is beyond the scope of this paper, and is provided in another paper [30].…”
Section: Click-order Pattern Attack Resultsmentioning
confidence: 99%
“…Chiasson et al [6] further compared the popularity of a set of click-order patterns across three different schemes: PassPoints, CCP, and PCCP. Salehi-Abari et al [37] defined additional patterns and demonstrated their exploitability with both strict and relaxed pattern definitions; an extension of that paper [30] indicates that some click-order patterns result in a better offline attack than S hs−ind herein, but the accuracy of S hs−dep herein remains superior. As such, human-seeded and click-order pattern based attacks are complimentary approaches: human seeded attacks offer better guessing accuracy such that they are the primary threat in online environments, whereas click-order pattern attacks find a higher percentage of passwords in an offline attack.…”
Section: Related Workmentioning
confidence: 98%
“…A good overview of popular graphical password schemes has been reported in [2]. Different usability studies have outlined the advantages of graphical passwords, such as their reasonable login and creation times, acceptable error rates, good general perception and reduced interference compared to text passwords, but also their vulnerabilities [27] [30]. As mentioned earlier, lock patterns are one type of recall-based graphical password [2].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have explored three broad types of graphical passwords: recall-based draw metric schemes based on sketching shapes on screen, recognition-based cognometric schemes based on selecting known items from large sets of options, and cued-recall loci-metric schemes based on selecting regions of pre-chosen images. Loci-metric schemes are discussed as is multifactor authentication [10], as it relates to Graphical Cryptographic Verification System and its combination of a token, or something you have, on which a password, or something you know, is entered.…”
Section: Related Workmentioning
confidence: 99%