07.08.2015 Views

The Saucer

6G3Qy9djr

6G3Qy9djr

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>The</strong> <strong>Saucer</strong> Summer 2015“I Added ‘!’ at the End to Make It Secure”: ObservingPassword Creation in the LabB. Ur, F. Noma, J. Bees, S. Segreti, R. Shay, L. Bauer, N. Christin, L. CranorSOUPS 2015Users often make passwords that are easy for attackers toguess. Prior studies have documented features that lead toeasily guessed passwords, but have not probed why users craftweak passwords. To understand the genesis of commonpassword patterns and uncover average users' misconceptionsabout password strength, we conducted a qualitative interviewstudy. In our lab, 49 participants each created passwords forfictitious banking, email, and news website accounts whilethinking aloud. We then interviewed them about their generalstrategies and inspirations. Most participants had a well-definedprocess for creating passwords. In some cases, participantsconsciously made weak passwords. In other cases, however,weak passwords resulted from misconceptions, such as thebelief that adding “!” to the end of a password instantly makesit secure or that words that are difficult to spell are more securethan easy-to-spell words. Participants commonly anticipatedonly very targeted attacks, believing that using a birthday orname is secure if those data are not on Facebook. In contrast,some participants made secure passwords using unpredictablephrases or non-standard capitalization. We identify aspects ofpassword creation ripe for guidance or automated intervention.A Spoonful of Sugar? <strong>The</strong> Impact of Guidance andFeedback on Password-Creation BehaviorR. Shay, L. Bauer, N. Christin, L. Cranor, A. Forget, S. Komanduri, M. Mazurek, W.Melicher, and B. UrCHI 2015Users often struggle to create passwords under strictrequirements. To make this process easier, some providerspresent real-time feedback during password creation, indicatingwhich requirements are not yet met. Other providers guideusers through a multi-step password-creation process. Our6,435-participant online study examines how feedback andguidance affect password security and usability. We find thatreal-time password-creation feedback can help users createstrong passwords with fewer errors. We also find that althoughguiding participants through a three-step password-creationprocess can make creation easier, it may result in weakerpasswords. Our results suggest that service providers shouldpresent password requirements with feedback to increaseusability. However, the presentation of feedback and guidancemust be carefully considered, since identical requirements canhave different security and usability effects depending onpresentation.Telepathwords: Preventing Weak Passwords byReading Users’ MindsS. Komanduri, R. Shay, L. Cranor, C. Herley, and S. SchechterUSENIX Security 2014To discourage the creation of predictable passwords, vulnerableto guessing attacks, we present Telepathwords. As a user creates apassword, Telepathwords makes realtime predictions for thenext character that user will type. While the concept is simple,making accurate predictions requires efficient algorithms tomodel users’ behavior and to employ already-typed charactersto predict subsequent ones. We first made the Telepathwordstechnology available to the public in late 2013 and have sinceserved hundreds of thousands of user sessions. We ran ahuman-subjects experiment to compare password policies thatuse Telepathwords to those that rely on composition rules,comparing participants’ passwords using two differentpassword-evaluation algorithms. We found that participantscreate far fewer weak passwords using the Telepathwordsbasedpolicies than policies based only on charactercomposition.Biometric Authentication on iPhone and Android:Usability, Perceptions, and Influences on Adoption.C. Bhagavatula, B. Ur, K. Iacovino, S. Kywe, L. Cranor, M. Savvides.USEC 2015While biometrics have long been promoted as the future ofauthentication, the recent introduction of Android face unlockand iPhone fingerprint unlock are among the first large-scaledeployments of biometrics for consumers. In a 10- participant,within-subjects lab study and a 198-participant online survey,we investigated the usability of these schemes, along with users’experiences, attitudes, and adoption decisions. Participants inour lab study found both face unlock and fingerprint unlockeasy to use in typical scenarios. <strong>The</strong> notable exception was thatface unlock was completely unusable in a dark room. Mostparticipants preferred fingerprint unlock over face unlock or aPIN. In our survey, most fingerprint unlock users perceived itas more secure and convenient than a PIN. In contrast, faceunlock users had mixed experiences, and many had stoppedusing it. We conclude with design recommendations forbiometric authentication on smartphones.Social NetworksI Would Like To..., I Shouldn't..., I Wish I...: ExploringBehavior-Change Goals for Social Networking SitesM. Sleeper, A. Acquisti, L. Cranor, P. Kelley, S. Munson, N. SadehCSCW 2015Despite the benefits they derive from social networking sites(SNSs), members of those services are not always satisfied withtheir online behaviors. <strong>The</strong> investigation of desires for behaviorchange in SNSs both provide insight into users’ perceptions ofhow SNSs impact their lives (positively or negatively) and caninform tools for helping users achieve desired behaviorchanges. We use a 604-participant online survey to explore SNSusers’ behavior-change goals for Facebook, Instagram, andTwitter. While some participants want to reduce site use, otherswant to improve their use or increase a range of behaviors.<strong>The</strong>se desired changes differ by SNS, and, for Twitter, byparticipants’ levels of site use. Participants also expect a rangeof benefits from these goals, including more free time, contactwith others, intrinsic benefits, better security/privacy, andimproved self presentation. We provide insights both into howparticipants perceive different SNSs, as well as potential designsfor behavior-change mechanisms to target SNS behaviors.7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!