Award Abstract # 1343141
EAGER: The Game Changer: A New Model for Password Security

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: CLEVELAND STATE UNIVERSITY
Initial Amendment Date: August 15, 2013
Latest Amendment Date: November 4, 2015
Award Number: 1343141
Award Instrument: Standard Grant
Program Manager: Ralph Wachter
rwachter@nsf.gov
 (703)292-8950
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2013
End Date: August 31, 2016 (Estimated)
Total Intended Award Amount: $202,251.00
Total Awarded Amount to Date: $234,251.00
Funds Obligated to Date: FY 2013 = $202,251.00
FY 2014 = $16,000.00

FY 2016 = $16,000.00
History of Investigator:
  • Ye Zhu (Principal Investigator)
    y.zhu61@csuohio.edu
  • Conor McLennan (Co-Principal Investigator)
  • Philip Manning (Co-Principal Investigator)
Recipient Sponsored Research Office: Cleveland State University
2121 EUCLID AVE
CLEVELAND
OH  US  44115-2226
(216)687-3630
Sponsor Congressional District: 11
Primary Place of Performance: Cleveland State University
OH  US  44115-2214
Primary Place of Performance
Congressional District:
11
Unique Entity Identifier (UEI): YKGMTXA2NVL6
Parent UEI:
NSF Program(s): Special Projects - CNS,
Secure &Trustworthy Cyberspace
Primary Program Source: 01001314DB NSF RESEARCH & RELATED ACTIVIT
01001415DB NSF RESEARCH & RELATED ACTIVIT

01001617DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 114Z, 7434, 7916, 9178, 9251
Program Element Code(s): 171400, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

We are evaluating a new model of password security in which users place pieces on a game board (e.g., chess pieces on a chessboard). The fact that existing systems are either memorable or secure, but not both, motivated our approach. We are testing 14-15 year old high school students, college students 18-30, and older adults 60-80, and we are conducting two types of experiments. First, we are measuring all groups' memories for passwords of two and four game pieces (after a 20-minute filled delay). Second, we are testing college students' memories for five different passwords over a 12-week period in which the game changes after week 10. The results are expected to reveal a dramatically better authentication method compared to existing systems. More specifically, participants are expected to create unique passwords that they can remember. Furthermore, performance is expected to decline during the first 10 weeks, as their passwords begin to interfere with one another, and increase dramatically during the final two weeks, once the game changes and they are able to use a new type of memory. We will present the results at social science and computer security conferences, and submit for publication to sociology, psychology, and security journals. Our approach offers a radical breakthrough that is mathematically secure and easy to remember. The model is applicable to a wide range of electronic platforms, including smartphones, computers, ATMs, and other high-risk electronic gateways. Consequently, the potential to benefit society with more secure systems should have an enormous impact.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Jialue Fang, Ye Zhu, and Yong Guan "Voice Pattern Hiding for VoIP Communications" The 25th International Conference on Computer Communication and Networks (ICCCN 2016) , 2016
Jonathan Gurary, Ye Zhu, George Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu "MAPS: A Multi-Dimensional Password Scheme for Mobile Authentication" 2015 ACM International Conference on Interactive Tabletops and Surfaces (ACM ITS) , 2015
Jonathan Gurary, Ye Zhu, Nahed Alnahash, Huirong Fu "Implicit Authentication for Mobile Devices Using Typing Behavior" the 18th International Conference on Human-Computer Interaction (HCII) , 2016
Nancy Alrajei, Huirong Fu, and Ye Zhu "Information Theory based Intrusion Detection in Sensor Networks" Journal of Communications Technology, Electronics and Computer Science , v.5 , 2016 , p.11
Nicholas Ruffing, Ye Zhu, Rudy Libertini, Yong Guan, Riccardo Bettati "Smartphone Reconnaissance: Operating System Identification" the 13th Annual IEEE Consumer Communications and Networking Conference (CCNC) , 2016
Richard Bassous, Roger Bassous, Huirong Fu, Ye Zhu, "Ambiguous Multi-Symmetric Cryptography" IEEE International Conference on Communications (ICC), 2015 , 2015
Ye Zhu, Anil Vikram, Huirong Fu "On Topology of Sensor Networks Deployed for Multitarget Tracking" IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS , v.15 , 2014 , p.1489 10.1109/TITS.2014.2301033
Ye Zhu, Anil Vikram, Huirong Fu, and Yong Guan "On Non-Cooperative Multiple-Target Tracking with Wireless Sensor Networks" IEEE Transactions on Wireless Communications , 2014 10.1109/TWC.2014.2329306
Yuanchao Lu, Ye Zhu, Matthew Itomlenskis, Seetharamayya Vyaghri, Huirong Fu "MMOPRG Bot Detection Based on Traffic Analysis" International Journal of Electronics and Information Engineering , 2014

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

It has become commonplace to note that computer systems protected by authentication systems are either mathematically robust or user-friendly, but not both.

We propose a Multi-dimensionAl Password Scheme (MAPS) for mobile authentication. MAPS fuses information from multiple dimensions to form a password. Using information from multiple dimensions can enlarge the password space and improve memorability by reducing memory interference. The information fusion in MAPS can greatly increase usability as significantly less input gestures are required fo r passwords of the same security strength in comparison to existing authentication methods. Graphical hints are designed to further improve MAPS’s memorability. Based on the idea of MAPS, we implement a Chess-based MAPS (CMAPS) for Android systems. Only 2 and 6 gestures are required for CMAPS to generate passwords with better security strength than 4-digit PINs and 8-character alphanumeric passwords respectively. Our user studies on CMAPS show that CMAPS, with security strength exceeding the strength of current mobile authentication schemes and exceeding the requirements of banking, can achieve high recall rates respectively

We propose PassGame, a shoulder-surfingresistant mobile authentication scheme based on boardgames. The design of PassGame is based on the popular gameof chess. PassGame challenges a user with a random formationof chess pieces on a game board. A successful authenticationrequires a user to respond to the challenge so that a set ofpredefined rules are satisfied after adjustments made by theuser. PassGame can be finished by a user without any chessknowledge. We implement PassGame on the Android operatingsystem. Our user studies with the Android implementation showthat PassGame passwords with more password strength thancurrent mobile authentication schemes can achieve 100% recall rates when recalled one week after password setup.

We propose a secondary implicit authentication scheme which monitors typing behavior to detect unauthorized use and lock down the mobile device. We build a basic implementation of our scheme on the Android operating system. Our user studies on the implementation show that we can achieve an accuracy of up to 97 % identifying one user out of a set of fifteen, with an FAR of < 3 % and an FRR of < .5 %.

We developed – and experimentally tested – the Game Changer Password System, a new approach to password security that is both mathematically robust and user-friendly. This approach, informed by cognitive psychology, involves giving up the idea of passwords as alphanumeric strings and replacing such strings with pieces on a game board. The Game Changer Password System emphasizes two new factors: fun and relative usability in different populations. Our work represents a unique combination of theoretical issues in password security from computer engineering and methods of empirical testing from the social sciences.

In Experiment 1, we examined high school student, younger adult, and older adult participants’ memory for game-based password, using chess or Monopoly. The results provide evidence that all three groups can remember game-based passwords fairly well. The fact that older adults and high school students do fairly well is important because these age groups are underrepresented in password security research. Future work might consider extending to even younger children.

In Experiment 2, we examined participants’ use of five game-based passwords across 24 sessions over 10 weeks. All five passwords were stored in chess or Monopoly for the initial 20 sessions, and changed (from chess to Monopoly or vice versa) for the remaining sessions. The results provide evidence that participants can remember multiple game-based passwords over 10 weeks fairly well. Moreover, when participants changed games and created new passwords, their performance was significantly better than the first time they entered their passwords.

One limitation of the current study is that the passwords we collected did not protect real user accounts – instead they were hypothetical accounts as part of our experimental testing. Outside the laboratory, the Game Changer Password System could be flexibly implemented depending, for example, on the desired level of security. The system has the potential to replace (or complement) existing password schemes for a wide range of electronic platforms, including smart phones, personal computers, tablets, ATMs, other high-risk electronic gateways, as well as the potential to replace (or complement) the use of keys.

The project offers a radical breakthrough and a permanent solution to password security by designing a system that is mathematically secure and easy to remember overtime. Given that the approach is applicable to a wide range of electronic platforms, includingsmart phones, personal computers, tablets, banking ATMs and other high-risk electronicgateways, the potential to benefit society with more secure systems in a variety of ways would have an enormous impact. A second societal outcome is the engagement of high school students, college students, and older adults with science and technology.


Last Modified: 11/30/2016
Modified by: Ye Zhu

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page