Abstract
In this paper we propose Tiles, a graphical authentication system in which users are assigned a target image and subsequently asked to select segments of that image. We assess the extent to which this system provides protection against two security threats: observation attacks and sharing of authentication credentials in two laboratory-based studies. We note some of the vulnerabilities of the new system but provide evidence that automated manipulation of the similarity of the decoy images can help mitigate the threat from verbal sharing and observation attacks.
| Original language | English |
|---|---|
| Title of host publication | CHI EA '12 |
| Subtitle of host publication | CHI '12 Extended Abstracts on Human Factors in Computing Systems |
| Place of Publication | New York |
| Publisher | Association for Computing Machinery (ACM) |
| Pages | 1967-1972 |
| Number of pages | 6 |
| ISBN (Print) | 9781450310161 |
| DOIs | |
| Publication status | Published - 5 May 2012 |
| Externally published | Yes |
| Event | 30th ACM Conference on Human Factors in Computing Systems: It's the experience! - Austin, United States Duration: 5 May 2012 → 10 May 2012 Conference number: 30th https://chi2012.acm.org/index.shtml |
Conference
| Conference | 30th ACM Conference on Human Factors in Computing Systems |
|---|---|
| Abbreviated title | CHI 2012 |
| Country/Territory | United States |
| City | Austin |
| Period | 5/05/12 → 10/05/12 |
| Internet address |
Keywords
- Shoulder surfing
- Graphical passwords
- Authentication
- Usable security
- Graphical authentication systems
Fingerprint
Dive into the research topics of 'A security assessment of tiles: a new portfolio-based graphical authentication system'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver