SlideShare a Scribd company logo
1 of 17
Download to read offline
Logging safely in public spaces
using attribute PINs
Frank Nielsen
Frank.Nielsen@acm.org
5793b870
Sony Computer Science Laboratories, Inc.

2013

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

1/17
Logging, the need for a secure UI...

We daily use...
◮

more and more cloud services...

◮

Internet terminals in public spaces...

→ threats of passwords being stolen (yielding identity theft!).
Many potential threats:
◮

shoulder-surfing attacks

◮

concealed spy cameras (video surveillance)

◮

spyware (key and mouse loggers)

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

2/17
Tokens, biometrics and secure UI...

Current mainstream solution:
◮

One Time passwords (OTPs), physical token (can be stolen
or borrowed too!), or

◮

biometrics (expensive)+PINs

Our proposal: Design a secure UI with zero-knowledge using
associative PINs: A UI PIN associated to a USR PIN (both secret).
→ robust by design to mouse loggers and video captures.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

3/17
Associative PINs
Concept = Two graphics keyboards:
◮

Fixed digit board (or letters, icons, etc.)

◮

Moveable cursor letter board (or digits, icons, etc.)

Task (Human): Align the cursor to the corresponding digit
◮

Origin is chosen at random (keylogger cannot replay mouse
motions).

◮

Torus topology for wrapping the moveable cursor board.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

4/17
Example (shuffling the fixed digit board after each input)

3141
CAHB

3141
CAHB

3141
CAHB

3141
CAHB

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

5/17
2 × 5 keyboard layout

◮

Implemented in Processing, processing.org

◮

Wrapping the cursor operating system on the screen edges
(for endless smooth toric motion) using JavaTM Robot class

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

6/17
Torus topology/mouse origin

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

7/17
Some extensions of the basic AssociativePIN system

◮

Use legacy password systems (split in half the password into
PASSWD and USR-PASSWD parts),

◮

Graphics board skins,

◮

Cursor control using another device,

◮

Free users from remembering another UI PASSWD: Generate
One-time UI PASSWDS from user profiles.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

8/17
Graphics skins: Colors/Icons on fixed Digits

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

9/17
Generating UI passwords from user profiles
To help user memorize the UI password and generate many UI
passwords, we define a user profile by asking a set of k questions,
each with n choices like what is her favorite food, favorite place,
favorite color, favorite celebrity, favorite movie, favorite music, etc.
Each time the user enters a key, the moveable cursor skin changes
to the next mode: food→place→color→celebrity→movie→music,
...
Furthermore, for k-length passwords, we generate a random
permutation on the question orders (yielding k! UI passwords)
However less secure when observers know or guess his/her
preferences.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

10/17
Prior work (I)
◮

CursorCamouflage [11]: set of dummy cursors that makes it
difficult for observers to correlate with the user hand motion.

◮

Convex Hull Pass Icons [12]: enter password with pass-icons
blended with other icons on a 2D layout; The user is required
to pass several challenges where each challenge asks to click
inside the convex hull of the pass icons.

◮

Cognitive Trapdoor Games [8]: select on which set the current
PIN code digit is contained. After a few selections, the system
knows by “intersecting” the challenge subsets which digit was
entered, and proceed for entering the next digit, etc.

◮

FakeCursor [9]: The FakeCursor system manages a fixed
secret and a disposal secret: enter pin code by aligning the
secret digit on the fixed disposal icons using left/right
ATM-like arrow buttons. We can interpret FakeCursor as a
discrete UI working on the 1D ring topology.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

11/17
Prior work (II)

◮

ColorPin [3]: PIN entry system using color PINs relying on
keyboard interactions. At the bottom of each digit, three
colored letters (black, red and white) are shown. Each letter
appears in all three different colors for security reasons. The
user enters the color PIN by pressing corresponding keyboard
keys.

◮

Login systems designed based on eye gaze input [6]

◮

PIN Tactons [7]. Well-suited for visually impaired people.

◮

etc.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

12/17
Potential security threats

◮

UI PASSWORD too simple

◮

gaze tracking and advanced computer vision: guess which
part were “intentionally” aligned by observing the user’ eyes.
→ risk minimized by showing a small board size.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

13/17
Videos/Software

http://www.sonycsl.co.jp/person/nielsen/ColorPINs/
http://www.youtube.com/watch?v=IDgaH-ilUCw
@article{ColorPINS,
author
= {Frank Nielsen},
title
= {Logging safely in public spaces using color PINs},
journal
= {CoRR},
volume
= {abs/1304.6499},
year
= {2013},
ee
= {http://arxiv.org/abs/1304.6499}
}

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

14/17
Bibliographic references I
William Cheswick.
Rethinking passwords.
Commun. ACM, 56(2):40–44, February 2013.
John Chuang, Hamilton Nguyen, Charles Wang, and Benjamin Johnson.
I think, therefore i am: Usability and security of authentication using brainwaves.
In Proceedings of the Workshop on Usable Security, USEC ’13, 2013.
Alexander De Luca, Katja Hertzschuch, and Heinrich Hussmann.
Colorpin: securing pin entry through indirect input.
In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pages
1103–1106, New York, NY, USA, 2010. ACM.
Yutaka Hirakawa, Motohiro Take, and Kazuo Ohzeki.
Pass-image authentication method tolerant to random and video-recording attacks.
International Journal of Computer Science & Applications (IJCSA), 9(3):20–36, 2012.
B. Kaliski.
Pkcs #5: Password-based cryptography specification version 2.0 (rfc), 2000.
Manu Kumar, Tal Garfinkel, Dan Boneh, and Terry Winograd.
Reducing shoulder-surfing by using gaze-based password entry.
In Proceedings of the 3rd symposium on Usable privacy and security, SOUPS ’07, pages 13–19, New York,
NY, USA, 2007. ACM.
c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

15/17
Bibliographic references II
Xuˆn-Linh Labb´.
a
e
Touchscreen accessibility - accessible and secure authentication using a haptic PIN.
Master’s thesis, University of Glasgow, 2010.
Volker Roth, Kai Richter, and Rene Freidinger.
A PIN-entry method resilient against shoulder surfing.
In Proceedings of the 11th ACM conference on Computer and communications security, CCS ’04, pages
236–245, New York, NY, USA, 2004. ACM.
Tetsuji Takada.
Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras.
In Proceedings of the 2 Second International Conference on Mobile Ubiquitous Computing, Systems,
Services and Technologies, UBICOMM ’08, pages 395–400, Washington, DC, USA, 2008. IEEE Computer
Society.
Tetsuji Takada.
Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras.
In Proceedings of the 2008 The Second International Conference on Mobile Ubiquitous Computing,
Systems, Services and Technologies, UBICOMM ’08, pages 395–400, Washington, DC, USA, 2008. IEEE
Computer Society.
Keita Watanabe, Fumito Higuchi, Masahiko Inami, and Takeo Igarashi.
CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing.
In SIGGRAPH Asia 2012 Emerging Technologies, SA ’12, pages 6:1–6:2, New York, NY, USA, 2012. ACM.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

16/17
Bibliographic references III

Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, and Jean-Camille Birget.
Design and evaluation of a shoulder-surfing resistant graphical password scheme.
In Proceedings of the working conference on Advanced visual interfaces, AVI ’06, pages 177–184, New York,
NY, USA, 2006. ACM.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

17/17

More Related Content

Viewers also liked

Inteligencia Artificial
Inteligencia ArtificialInteligencia Artificial
Inteligencia Artificialomarjmv
 
Mechanical design – ii (mee 303) rcs (makeup)
Mechanical design – ii (mee  303) rcs (makeup)Mechanical design – ii (mee  303) rcs (makeup)
Mechanical design – ii (mee 303) rcs (makeup)Prasoon Ranjan
 
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์Khemjira_P
 
Commodity daily-technical-report-09-december
Commodity daily-technical-report-09-decemberCommodity daily-technical-report-09-december
Commodity daily-technical-report-09-decembertrifid research
 
спосіб округлення. математика 4 клас
спосіб округлення. математика 4 класспосіб округлення. математика 4 клас
спосіб округлення. математика 4 класЖанна Коваль
 
Linkedin recruitment | A view tips...
Linkedin recruitment | A view tips...Linkedin recruitment | A view tips...
Linkedin recruitment | A view tips...Sander Bredewout
 
โครงงานคอมพิวเตอร์
โครงงานคอมพิวเตอร์โครงงานคอมพิวเตอร์
โครงงานคอมพิวเตอร์Khemjira_P
 
thinkBIM 2013 pecha kucha
thinkBIM 2013 pecha kuchathinkBIM 2013 pecha kucha
thinkBIM 2013 pecha kuchaCampus
 
IGL Relocation - Brochure
IGL Relocation - BrochureIGL Relocation - Brochure
IGL Relocation - BrochureIGL Relocation
 

Viewers also liked (20)

Investment management
Investment managementInvestment management
Investment management
 
Blackberry (1)
Blackberry (1)Blackberry (1)
Blackberry (1)
 
Inteligencia Artificial
Inteligencia ArtificialInteligencia Artificial
Inteligencia Artificial
 
Blackberry (4)
Blackberry (4)Blackberry (4)
Blackberry (4)
 
Fitness
FitnessFitness
Fitness
 
Blackberry (2)
Blackberry (2)Blackberry (2)
Blackberry (2)
 
Blackberry (3)
Blackberry (3)Blackberry (3)
Blackberry (3)
 
Kurumsallaşma eğitimi
Kurumsallaşma eğitimiKurumsallaşma eğitimi
Kurumsallaşma eğitimi
 
Mechanical design – ii (mee 303) rcs (makeup)
Mechanical design – ii (mee  303) rcs (makeup)Mechanical design – ii (mee  303) rcs (makeup)
Mechanical design – ii (mee 303) rcs (makeup)
 
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
 
Commodity daily-technical-report-09-december
Commodity daily-technical-report-09-decemberCommodity daily-technical-report-09-december
Commodity daily-technical-report-09-december
 
separaciones
separacionesseparaciones
separaciones
 
спосіб округлення. математика 4 клас
спосіб округлення. математика 4 класспосіб округлення. математика 4 клас
спосіб округлення. математика 4 клас
 
Linkedin recruitment | A view tips...
Linkedin recruitment | A view tips...Linkedin recruitment | A view tips...
Linkedin recruitment | A view tips...
 
โครงงานคอมพิวเตอร์
โครงงานคอมพิวเตอร์โครงงานคอมพิวเตอร์
โครงงานคอมพิวเตอร์
 
thinkBIM 2013 pecha kucha
thinkBIM 2013 pecha kuchathinkBIM 2013 pecha kucha
thinkBIM 2013 pecha kucha
 
IGL Relocation - Brochure
IGL Relocation - BrochureIGL Relocation - Brochure
IGL Relocation - Brochure
 
Bangalore brochure design company
Bangalore brochure design companyBangalore brochure design company
Bangalore brochure design company
 
Evolución de la filosofía social
Evolución de la filosofía socialEvolución de la filosofía social
Evolución de la filosofía social
 
ITBMS Profile
ITBMS ProfileITBMS Profile
ITBMS Profile
 

Similar to Slides: Logging safely in public spaces using color PINs

sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.
sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.
sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.Richard Des Nieves M
 
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...ITCamp
 
PPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh SidhuPPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh Sidhujagdeepsidhu
 
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyEmerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyITCamp
 
5 pen pc technology by divya
5 pen pc technology by divya5 pen pc technology by divya
5 pen pc technology by divyaDivya Baghel
 
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...ITCamp
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lockIRJET Journal
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyIRJET Journal
 
Sixth sense technology PPT
Sixth sense technology PPTSixth sense technology PPT
Sixth sense technology PPTkrishna singh
 
5 Pen Pc Technology
5 Pen Pc Technology5 Pen Pc Technology
5 Pen Pc TechnologySai Mohanty
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
L2 cs110 jcu-sindonirev04092011
L2 cs110 jcu-sindonirev04092011L2 cs110 jcu-sindonirev04092011
L2 cs110 jcu-sindonirev04092011Giuseppe Sindoni
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
Six Sense Technology
Six Sense TechnologySix Sense Technology
Six Sense TechnologyKrishna Omer
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technologyAkhil Ak
 
sixth sense technology.pdf
sixth sense technology.pdfsixth sense technology.pdf
sixth sense technology.pdfgopika1official
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)IAESIJEECS
 
Sixth sense by kuntal ppt
Sixth sense by kuntal pptSixth sense by kuntal ppt
Sixth sense by kuntal pptKrishh Patel
 
Sixth sense
Sixth senseSixth sense
Sixth senseShilpa S
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 

Similar to Slides: Logging safely in public spaces using color PINs (20)

sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.
sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.
sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.
 
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
 
PPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh SidhuPPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh Sidhu
 
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyEmerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
 
5 pen pc technology by divya
5 pen pc technology by divya5 pen pc technology by divya
5 pen pc technology by divya
 
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
 
Sixth sense technology PPT
Sixth sense technology PPTSixth sense technology PPT
Sixth sense technology PPT
 
5 Pen Pc Technology
5 Pen Pc Technology5 Pen Pc Technology
5 Pen Pc Technology
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
L2 cs110 jcu-sindonirev04092011
L2 cs110 jcu-sindonirev04092011L2 cs110 jcu-sindonirev04092011
L2 cs110 jcu-sindonirev04092011
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
Six Sense Technology
Six Sense TechnologySix Sense Technology
Six Sense Technology
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
sixth sense technology.pdf
sixth sense technology.pdfsixth sense technology.pdf
sixth sense technology.pdf
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)
 
Sixth sense by kuntal ppt
Sixth sense by kuntal pptSixth sense by kuntal ppt
Sixth sense by kuntal ppt
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Slides: Logging safely in public spaces using color PINs

  • 1. Logging safely in public spaces using attribute PINs Frank Nielsen Frank.Nielsen@acm.org 5793b870 Sony Computer Science Laboratories, Inc. 2013 c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 1/17
  • 2. Logging, the need for a secure UI... We daily use... ◮ more and more cloud services... ◮ Internet terminals in public spaces... → threats of passwords being stolen (yielding identity theft!). Many potential threats: ◮ shoulder-surfing attacks ◮ concealed spy cameras (video surveillance) ◮ spyware (key and mouse loggers) c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 2/17
  • 3. Tokens, biometrics and secure UI... Current mainstream solution: ◮ One Time passwords (OTPs), physical token (can be stolen or borrowed too!), or ◮ biometrics (expensive)+PINs Our proposal: Design a secure UI with zero-knowledge using associative PINs: A UI PIN associated to a USR PIN (both secret). → robust by design to mouse loggers and video captures. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 3/17
  • 4. Associative PINs Concept = Two graphics keyboards: ◮ Fixed digit board (or letters, icons, etc.) ◮ Moveable cursor letter board (or digits, icons, etc.) Task (Human): Align the cursor to the corresponding digit ◮ Origin is chosen at random (keylogger cannot replay mouse motions). ◮ Torus topology for wrapping the moveable cursor board. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 4/17
  • 5. Example (shuffling the fixed digit board after each input) 3141 CAHB 3141 CAHB 3141 CAHB 3141 CAHB c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 5/17
  • 6. 2 × 5 keyboard layout ◮ Implemented in Processing, processing.org ◮ Wrapping the cursor operating system on the screen edges (for endless smooth toric motion) using JavaTM Robot class c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 6/17
  • 7. Torus topology/mouse origin c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 7/17
  • 8. Some extensions of the basic AssociativePIN system ◮ Use legacy password systems (split in half the password into PASSWD and USR-PASSWD parts), ◮ Graphics board skins, ◮ Cursor control using another device, ◮ Free users from remembering another UI PASSWD: Generate One-time UI PASSWDS from user profiles. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 8/17
  • 9. Graphics skins: Colors/Icons on fixed Digits c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 9/17
  • 10. Generating UI passwords from user profiles To help user memorize the UI password and generate many UI passwords, we define a user profile by asking a set of k questions, each with n choices like what is her favorite food, favorite place, favorite color, favorite celebrity, favorite movie, favorite music, etc. Each time the user enters a key, the moveable cursor skin changes to the next mode: food→place→color→celebrity→movie→music, ... Furthermore, for k-length passwords, we generate a random permutation on the question orders (yielding k! UI passwords) However less secure when observers know or guess his/her preferences. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 10/17
  • 11. Prior work (I) ◮ CursorCamouflage [11]: set of dummy cursors that makes it difficult for observers to correlate with the user hand motion. ◮ Convex Hull Pass Icons [12]: enter password with pass-icons blended with other icons on a 2D layout; The user is required to pass several challenges where each challenge asks to click inside the convex hull of the pass icons. ◮ Cognitive Trapdoor Games [8]: select on which set the current PIN code digit is contained. After a few selections, the system knows by “intersecting” the challenge subsets which digit was entered, and proceed for entering the next digit, etc. ◮ FakeCursor [9]: The FakeCursor system manages a fixed secret and a disposal secret: enter pin code by aligning the secret digit on the fixed disposal icons using left/right ATM-like arrow buttons. We can interpret FakeCursor as a discrete UI working on the 1D ring topology. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 11/17
  • 12. Prior work (II) ◮ ColorPin [3]: PIN entry system using color PINs relying on keyboard interactions. At the bottom of each digit, three colored letters (black, red and white) are shown. Each letter appears in all three different colors for security reasons. The user enters the color PIN by pressing corresponding keyboard keys. ◮ Login systems designed based on eye gaze input [6] ◮ PIN Tactons [7]. Well-suited for visually impaired people. ◮ etc. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 12/17
  • 13. Potential security threats ◮ UI PASSWORD too simple ◮ gaze tracking and advanced computer vision: guess which part were “intentionally” aligned by observing the user’ eyes. → risk minimized by showing a small board size. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 13/17
  • 14. Videos/Software http://www.sonycsl.co.jp/person/nielsen/ColorPINs/ http://www.youtube.com/watch?v=IDgaH-ilUCw @article{ColorPINS, author = {Frank Nielsen}, title = {Logging safely in public spaces using color PINs}, journal = {CoRR}, volume = {abs/1304.6499}, year = {2013}, ee = {http://arxiv.org/abs/1304.6499} } c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 14/17
  • 15. Bibliographic references I William Cheswick. Rethinking passwords. Commun. ACM, 56(2):40–44, February 2013. John Chuang, Hamilton Nguyen, Charles Wang, and Benjamin Johnson. I think, therefore i am: Usability and security of authentication using brainwaves. In Proceedings of the Workshop on Usable Security, USEC ’13, 2013. Alexander De Luca, Katja Hertzschuch, and Heinrich Hussmann. Colorpin: securing pin entry through indirect input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pages 1103–1106, New York, NY, USA, 2010. ACM. Yutaka Hirakawa, Motohiro Take, and Kazuo Ohzeki. Pass-image authentication method tolerant to random and video-recording attacks. International Journal of Computer Science & Applications (IJCSA), 9(3):20–36, 2012. B. Kaliski. Pkcs #5: Password-based cryptography specification version 2.0 (rfc), 2000. Manu Kumar, Tal Garfinkel, Dan Boneh, and Terry Winograd. Reducing shoulder-surfing by using gaze-based password entry. In Proceedings of the 3rd symposium on Usable privacy and security, SOUPS ’07, pages 13–19, New York, NY, USA, 2007. ACM. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 15/17
  • 16. Bibliographic references II Xuˆn-Linh Labb´. a e Touchscreen accessibility - accessible and secure authentication using a haptic PIN. Master’s thesis, University of Glasgow, 2010. Volker Roth, Kai Richter, and Rene Freidinger. A PIN-entry method resilient against shoulder surfing. In Proceedings of the 11th ACM conference on Computer and communications security, CCS ’04, pages 236–245, New York, NY, USA, 2004. ACM. Tetsuji Takada. Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras. In Proceedings of the 2 Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM ’08, pages 395–400, Washington, DC, USA, 2008. IEEE Computer Society. Tetsuji Takada. Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras. In Proceedings of the 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM ’08, pages 395–400, Washington, DC, USA, 2008. IEEE Computer Society. Keita Watanabe, Fumito Higuchi, Masahiko Inami, and Takeo Igarashi. CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing. In SIGGRAPH Asia 2012 Emerging Technologies, SA ’12, pages 6:1–6:2, New York, NY, USA, 2012. ACM. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 16/17
  • 17. Bibliographic references III Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, and Jean-Camille Birget. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of the working conference on Advanced visual interfaces, AVI ’06, pages 177–184, New York, NY, USA, 2006. ACM. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 17/17