ABSTRACT
Blind mobile device users face security risks such as inaccessible authentication methods, and aural and visual eavesdropping. We interviewed 13 blind smartphone users and found that most participants were unaware of or not concerned about potential security threats. Not a single participant used optional authentication methods such as a password-protected screen lock. We addressed the high risk of unauthorized user access by developing PassChords, a non-visual authentication method for touch surfaces that is robust to aural and visual eavesdropping. A user enters a PassChord by tapping several times on a touch surface with one or more fingers. The set of fingers used in each tap defines the password. We give preliminary evidence that a four-tap PassChord has about the same entropy, a measure of password strength, as a four-digit personal identification number (PIN) used in the iPhone's Passcode Lock. We conducted a study with 16 blind participants that showed that PassChords were nearly three times as fast as iPhone's Passcode Lock with VoiceOver, suggesting that PassChords are a viable accessible authentication method for touch screens.
References
- N. Asokan and C. Kuo. Usable mobile security. In ICDCIT, pages 1--6, 2012. Google Scholar
Digital Library
- D. Asonov and R. Agrawal. Keyboard acoustic emanations. In IEEE Symposium on Security and Privacy, pages 3--11, 2004.Google Scholar
Cross Ref
- S. Azenkot, J. O. Wobbrock, S. Prasain, and R. E. Ladner. Input finger detection for nonvisual touch screen text entry in perkinput. In Proc. GI'12, New York, NY, USA, 2012. ACM. Google Scholar
Digital Library
- N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer, A. Ben-Oved, and S. Moller. On the need for different security methods on mobile phones. In Proc. MobileHCI'11, pages 465--473, New York, NY, USA, 2011. ACM. Google Scholar
Digital Library
- Y. Berger, A. Wool, and A. Yeredor. Dictionary attacks using keyboard acoustic emanations. In Proc. CCS'06, pages 245--254, New York, NY, USA, 2006. ACM. Google Scholar
Digital Library
- J. P. Bigham and A. C. Cavender. Evaluating existing audio captchas and an interface optimized for non-visual use. In Proc. CHI'09, pages 1829--1838, New York, NY, USA, 2009. ACM. Google Scholar
Digital Library
- M. Burnett. Perfect passwords. Syngress Publishing, Rockland, Massachusetts, 2006.Google Scholar
- W. E. Burr, D. F. Dodson, W. T. Polk, and D. L. Evans. Electronic authentication guideline. In NIST Special Publication, 2004.Google Scholar
- N. Clarke and S. Furnell. Authentication of users on mobile telephones: A survey of attitudes and practices. Computers Security, 24(7):519--527, 2005.Google Scholar
Digital Library
- R. Dhamija and A. Perrig. Deja vu: A user study using images for authentication. In Proc. USENIX Security Symposium, pages 45--58, Berkeley, CA, USA, 2000. USENIX Association. Google Scholar
Digital Library
- D. Foo Kune and Y. Kim. Timing attacks on pin input devices. In Proc. CCS'10, pages 678--680, New York, NY, USA, 2010. ACM. Google Scholar
Digital Library
- J. Holman, J. Lazar, J. H. Feng, and J. D'Arcy. Developing usable captchas for blind users. In Proc. ASSETS'07, pages 245--246, New York, NY, USA, 2007. ACM. Google Scholar
Digital Library
- M. Jakobsson. Why mobile security is not like traditional security, 2011. http://www.markusjakobsson. com/wp-content/uploads/fc11jakobsson.pdf.Google Scholar
- M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit authentication for mobile devices. In Proc. HotSec'09, pages 9--9, Berkeley, CA, USA, 2009. USENIX Association. Google Scholar
Digital Library
- W. Jansen, K. Scarfone, C. M. Gutierrez, D. Patrick, D. Gallagher, and D. Director. Guidelines on cell phone and pda security recommendations of the national, 2008.Google Scholar
- I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In Proc SSYM'99, pages 1--1, Berkeley, CA, USA, 1999. USENIX Association. Google Scholar
Digital Library
- S. K. Kane, C. Jayant, J. O. Wobbrock, and R. E. Ladner. Freedom to roam: a study of mobile device adoption and accessibility for people with visual and motor disabilities. In Proc. ASSETS'09, pages 115--122, New York, NY, USA, 2009. ACM. Google Scholar
Digital Library
- V. Kostakos. Human-in-the-loop: rethinking security in mobile and pervasive systems. In CHI EA '08, pages 3075--3080, New York, NY, USA, 2008. ACM. Google Scholar
Digital Library
- R. Kuber and S. Sharma. Toward tactile authentication for blind users. In Proc. ASSETS'10, pages 289--290, New York, NY, USA, 2010. ACM. Google Scholar
Digital Library
- F. X. Lin, D. Ashbrook, and S. White. Rhythmlink: securely pairing i/o-constrained devices by tapping. In Proc. UIST'11, pages 263--272, New York, NY, USA, 2011. ACM. Google Scholar
Digital Library
- P. C. v. Oorschot and J. Thorpe. On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur., 10(4):5:1--5:33, Jan. 2008. Google Scholar
Digital Library
- K. Poulsen. Mitnick to lawmakers: People, phones and weakest links, 2009. http://www.politechbot.com/p-00969.html.Google Scholar
- B. Schneier. The secret question is: why do IT systems use insecure passwords? The Guardian, 2009. http://www.guardian.co.uk/technology/2009/feb/19/insecurepasswords-conickerb-worm.Google Scholar
- S. Shirali-Shahreza and M. H. Shirali-Shahreza. Accessibility of captcha methods. In Proc. AISec'11, pages 109--110, New York, NY, USA, 2011. ACM. Google Scholar
Digital Library
- X. Suo, Y. Zhu, and G. Owen. Graphical passwords: a survey. In Computer Security Applications Conference, 21st Annual, page 472, dec. 2005. Google Scholar
Digital Library
- S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Passpoints: Design and longitudinal evaluation of a graphical password system. In Proc. USENIX Security Symposium, pages 102--127, Berkeley, CA, USA, 2005. USENIX Association.Google Scholar
Digital Library
- J. O. Wobbrock. Tapsongs: tapping rhythm-based passwords on a single binary sensor. In Proc. UIST'09, pages 93--96, New York, NY, USA, 2009. ACM. Google Scholar
Digital Library
- J. O. Wobbrock, L. Findlater, D. Gergle, and J. J. Higgins. The aligned rank transform for nonparametric factorial analyses using only anova procedures. In Proc. CHI'11, pages 143--146, New York, NY, USA, 2011. ACM. Google Scholar
Digital Library
- Q. Xiao. Security issues in biometric authentication. In Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC, pages 8--13, june 2005.Google Scholar
Cross Ref
Index Terms
PassChords: secure multi-touch authentication for blind people





Comments