Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Psychology

Old Dominion University

2019

Authentication

Articles 1 - 1 of 1

Full-Text Articles in Social and Behavioral Sciences

Identifying The Strengths And Weaknesses Of Over-The-Shoulder Attack Resistant Prototypical Graphical Authentication Schemes, Ashley Allison Cain Apr 2019

Identifying The Strengths And Weaknesses Of Over-The-Shoulder Attack Resistant Prototypical Graphical Authentication Schemes, Ashley Allison Cain

Psychology Theses & Dissertations

Authentication verifies users’ identities to protect against costly attacks. Graphical authentication schemes utilize pictures as passcodes rather than strings of characters. Pictures have been found to be more memorable than the strings of characters used in alphanumeric passwords. However, graphical passcodes have been criticized for being susceptible to Over-the-Shoulder Attacks (OSA). To overcome this concern, many graphical schemes have been designed to be resistant to OSA. Security to this type of attack is accomplished by grouping targets among distractors, translating the selection of targets elsewhere, disguising targets, and using gaze-based input.

Prototypical examples of graphical schemes that use these strategies …