University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior

Perković, T, Mumtaz, A, Javed, Y, Li, SJ, Khayam, SA and Čagalj, M (2011) Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior In: 7th Symposium On Usable Privacy and Security (SOUPS 2011), 2011-07-20 - 2011-07-22, Carnegie Mellon University in Pittsburgh, PA, USA.

[img]
Preview
PDF
SOUPS2011a.pdf
Available under License : See the attached licence file.

Download (862kB)
[img]
Preview
PDF (licence)
SRI_deposit_agreement.pdf

Download (33kB)

Abstract

This paper reports two attacks on Undercover, a human authentication scheme against passive observers proposed at CHI 2008. The first attack exploits nonuniform human behavior in responding to authentication challenges and the second one is based on information leaked from authentication challenges or responses visible to the attacker. The second attack can be generalized to break two alternative Undercover designs presented at Pervasive 2009. All the attacks exploit design flaws of the Undercover implementations. Theoretical and experimental analyses show that both attacks can reveal the user’s password with high probability with O(10) observed login sessions. Both attacks were verified by using the login data collected in a user study with 28 participants. We also propose some enhancements to make Undercover secure against the attacks reported in this paper. Our research in breaking and improving Undercover leads to two broader implications. First, it reemphasizes the principle of “devil is in details” for the design of security-related human-computer interface. Secondly, it reveals a subtle relationship between security and usability: human users may behave in an insecure way to compromise the security of a system. To design a secure human-computer interface, designers should pay special attention to possible negative influence of any detail of the interface including how human users interact with the system.

Item Type: Conference or Workshop Item (Conference Paper)
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
AuthorsEmailORCID
Perković, TUNSPECIFIEDUNSPECIFIED
Mumtaz, AUNSPECIFIEDUNSPECIFIED
Javed, YUNSPECIFIEDUNSPECIFIED
Li, SJUNSPECIFIEDUNSPECIFIED
Khayam, SAUNSPECIFIEDUNSPECIFIED
Čagalj, MUNSPECIFIEDUNSPECIFIED
Date : 2011
Identification Number : 10.1145/2078827.2078834
Contributors :
ContributionNameEmailORCID
PublisherACM, UNSPECIFIEDUNSPECIFIED
Related URLs :
Additional Information : Copyright 2011 The Authors
Depositing User : Symplectic Elements
Date Deposited : 26 Aug 2015 14:16
Last Modified : 26 Aug 2015 14:16
URI: http://epubs.surrey.ac.uk/id/eprint/532420

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800