[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3334480.3382922acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

Twice as Nice? A Preliminary Evaluation of Double Android Unlock Patterns

Published: 25 April 2020 Publication History

Abstract

Android unlock patterns are a widely used form of graphical passwords, and like all password schemes, numerous studies have shown that users select a relatively guessable and non-diverse set of passwords. While proposals have been put forth for hardening patterns, such as increasing the number of or changing the location of contact points, none of these proposals has been implemented in the decade-plus since the interface's launch. We propose a new approach; instead of increasing the individual complexity, users select two sequential Android patterns, so called Double Patterns, that are visually super imposed on one another. This allows more complexity without dramatically changing the interface. We report on our preliminary findings of a large user study (n=634) of Double Patterns, finding strong evidence that the scheme is highly usable and increases the complexity of user choice.

References

[1]
Adam J. Aviv, Devon Budzitowski, and Ravi Kuber. 2015. Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock. In Annual Computer Security Applications Conference (ACSAC '15). ACM, Los Angeles, California, USA, 301--310.
[2]
Adam J. Aviv and Markus Dürmuth. 2018. A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns. CoRR abs/1811.10548 (Nov. 2018), 1--20.
[3]
Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, and Hyoungshick Kim. 2017. SysPal: System-Guided Pattern Locks for Android. In IEEE Symposium on Security and Privacy (SP '17). IEEE, San Jose, California, USA, 338--356.
[4]
Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Symposium on Usable Privacy and Security (SOUPS '14). USENIX, Menlo Park, California, USA, 213--230.
[5]
Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim, and Jun Ho Huh. 2015. On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks. In ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, Seoul, Republic of Korea, 2343--2352.
[6]
Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha, and Ketan Vyas. 2017. Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17). ACM, New York, NY, USA, 400--407.
[7]
Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz. 2013. Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns. In ACM Conference on Computer and Communications Security (CCS '13). ACM, Berlin, Germany, 161--172.

Cited By

View all
  • (2023)RePaLM: A Data-Driven AI Assistant for Making Stronger Pattern ChoicesHuman-Computer Interaction – INTERACT 202310.1007/978-3-031-42286-7_4(59-69)Online publication date: 28-Aug-2023
  • (2021)RepliCueAuth: Validating the Use of a Lab-Based Virtual Reality Setup for Evaluating Authentication SystemsProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445478(1-18)Online publication date: 6-May-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems
April 2020
4474 pages
ISBN:9781450368193
DOI:10.1145/3334480
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 April 2020

Check for updates

Author Tags

  1. android patterns
  2. mobile authentication
  3. security
  4. usability

Qualifiers

  • Abstract

Funding Sources

  • National Science Foundation

Conference

CHI '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)RePaLM: A Data-Driven AI Assistant for Making Stronger Pattern ChoicesHuman-Computer Interaction – INTERACT 202310.1007/978-3-031-42286-7_4(59-69)Online publication date: 28-Aug-2023
  • (2021)RepliCueAuth: Validating the Use of a Lab-Based Virtual Reality Setup for Evaluating Authentication SystemsProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445478(1-18)Online publication date: 6-May-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media