Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method

Panagiotis Andriotis, Theo Tryfonas, George Oikonomou

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Abstract

One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the selection of a perceivably secure pattern. We first define a suitable metric to measure pattern strength, taking into account the constraints imposed by the Pattern-Lock mechanism's design. We then implement an app via which we conduct a survey for Android users, retaining demographic information of responders and their perceptions on what constitutes a pattern complex enough to be secure. Subsequently, we display a pattern strength meter to the participant and investigate whether this additional prompt influences the user to change their pattern to a more effective and complex one. We also investigate potential correlations between our findings and results of a previous pilot study in order to detect any significant biases on setting a Pattern-Lock.
Original languageEnglish
Title of host publicationHuman Aspects of Information Security, Privacy, and Trust - HAS 2014
EditorsTheo Tryfonas, Ioannis G. Askoxylakis
PublisherSpringer Berlin Heidelberg
Pages115-126
Volume8533
DOIs
Publication statusPublished - 2014
EventHCII 2014 - Chersonissos, Heraklion, Greece
Duration: 22 Jun 201427 Jun 2014

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Conference

ConferenceHCII 2014
Country/TerritoryGreece
CityHeraklion
Period22/06/1427/06/14

Keywords

  • Security
  • Android
  • password
  • bias
  • usability
  • feedback

Fingerprint

Dive into the research topics of 'Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method'. Together they form a unique fingerprint.

Cite this