 | Florian Alt; Stefan Schneegass; Alireza Sahami; Mariam Hassib; Andreas Bulling Graphical Passwords in the Wild – Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes Inproceedings Proc. of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2015), pp. 316-322, 2015. Abstract | Links | BibTeX @inproceedings{Alt_MobileHCI15,
title = {Graphical Passwords in the Wild – Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes},
author = {Florian Alt and Stefan Schneegass and Alireza Sahami and Mariam Hassib and Andreas Bulling},
url = {https://perceptual.mpi-inf.mpg.de/files/2015/07/Alt_MobileHCI15.pdf},
doi = {10.1145/2785830.2785882},
year = {2015},
date = {2015-04-21},
booktitle = {Proc. of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2015)},
pages = {316-322},
abstract = {Common user authentication methods on smartphones, such as lock patterns, PINs, or passwords, impose a trade-off between security and password memorability. Image-based passwords were proposed as a secure and usable alternative. As of today, however, it remains unclear how such schemes are used in the wild. We present the first study to investigate how image-based passwords are used over long periods of time in the real world. Our analyses are based on data from 2318 unique devices collected over more than one year using a custom application released in the Android Play store. We present an in-depth analysis of what kind of images users select, how they define their passwords, and how secure these passwords are. Our findings provide valuable insights into real-world use of image-based passwords and inform the design of future graphical authentication schemes.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Common user authentication methods on smartphones, such as lock patterns, PINs, or passwords, impose a trade-off between security and password memorability. Image-based passwords were proposed as a secure and usable alternative. As of today, however, it remains unclear how such schemes are used in the wild. We present the first study to investigate how image-based passwords are used over long periods of time in the real world. Our analyses are based on data from 2318 unique devices collected over more than one year using a custom application released in the Android Play store. We present an in-depth analysis of what kind of images users select, how they define their passwords, and how secure these passwords are. Our findings provide valuable insights into real-world use of image-based passwords and inform the design of future graphical authentication schemes. |