Experiences with Studying Usability of Two-Factor Authentication Technologies. Emiliano De Cristofaro https://emilianodc.com



Similar documents
A Comparative Usability Study of Two-Factor Authentication

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Guide to Evaluating Multi-Factor Authentication Solutions

STRONGER AUTHENTICATION for CA SiteMinder

French Justice Portal. Authentication methods and technologies. Page n 1

Entrust IdentityGuard

ADDING STRONGER AUTHENTICATION for VPN Access Control

Two-Factor Authentication: Guide to FEXCO CFX SMS/APP Verification

etoken Single Sign-On 3.0

User Identity and Authentication

Usable Multi-Factor Authentication and Risk- Based Authorization

White Paper. The Principles of Tokenless Two-Factor Authentication

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

Adding Stronger Authentication to your Portal and Cloud Apps

How to reduce the cost and complexity of two factor authentication

Facebook s Security Philosophy, and how Duo helps.

Remote Access Securing Your Employees Out of the Office

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

Authentication methods for mobile services INF 5261

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

AUTHENTICATION AND ACCESS CONTROL BEST PRACTICES FOR HEALTHCARE SYSTEMS

a. StarToken controls the loss due to you losing your Internet banking username and password.

Research Information Security Guideline

Securing corporate assets with two factor authentication

Improving Online Security with Strong, Personalized User Authentication

A brief on Two-Factor Authentication

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Alternative authentication what does it really provide?

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13

Two-Factor Authentication and Swivel

Digital identity: Toward more convenient, more secure online authentication

Proposal Document TitleDocument Version 1.0 TitleDocument

Brainloop Secure Dataroom Version QR Code Scanner Apps for ios Version 1.1 and for Android

The Convergence of IT Security and Physical Access Control

Two-Factor Authentication Basics for Linux. Pat Barron Western PA Linux Users Group

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

2-FACTOR AUTHENTICATION WITH

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Token Security or Just Token Security? A Vanson Bourne report for Entrust

Usable Multi-Factor Authentication and Risk-Based Authorization

Hard vs. Soft Tokens Making the Right Choice for Security

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Two-Factor Authentication: Tailor-Made for SMS

Welcome to Mobile Banking. Sunflower Bank Mobile Banking Personal User Guide

Longmai Mobile PKI Solution

Simplifying Security with Datakey Axis Single Sign-On. White Paper

The Convergence of IT Security and Physical Access Control

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

WHITE PAPER. Let s do BI (Biometric Identification)

Swivel Secure and the Cloud

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Two Factor Authentication and PKI Token (for Windows)

Device-Centric Authentication and WebCrypto

YubiKey Authentication Module Design Guideline

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

Moving to Multi-factor Authentication. Kevin Unthank

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Reaching the Tipping Point for Two-Factor Authentication

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide

Multi-Factor Authentication Job Aide

External Partner and Customer Login Instructions via myngc Portal

Multi-factor authentication

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

It s All About Authentication

HOTPin Integration Guide: DirectAccess

Virtual Code Authentication User s Guide. June 25, 2015

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Transcription:

Experiences with Studying Usability of Two-Factor Authentication Technologies Emiliano De Cristofaro https://emilianodc.com

Two Factor (2FA) Authentication Authentication Token password Fingerprint Phone PIN Retina Smart Card Pattern Palm Possession Knowledge Inherence 2

2FA Evolution Adoption no longer restricted to enterprise 2FA offered as an option by most numerous cloud & service providers New players and technologies in the market (not just RSA tokens for VPN) 3

Why Study 2FA Usability? Unusable authentication yields: More lockouts, resets loss of productivity Longer auth tasks drive customers/business away 2FA deployed in different contexts Different primary tasks no one-size-fits-all tech 4

Prior Work: 2FA vs Passwords - + More secure Less usable Slower Unfamiliar N. Gunson et al. User perceptions of security and usability of 1F and 2FA in automated telephone banking, 2011 C. S. Weir et al. User preferences for authentication methods in ebanking and the effects of experience, 2010 D. D. Strouble et al. Productivity and usability effects of using a two-factor security system, 2009 5

Our Objectives 1. (Comparatively) study users perceptions of 2FA usability, understand motivations for adoption, context of use 2. In-depth analysis of usability issues with actual users, specific primary tasks 6

Two Studies 1. E. De Cristofaro, H. Du, J. Freudiger, G. Norcie. Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication 8th NDSS Workshop on Usable Security (USEC 2014) 2. K. Krol, E. Philippou, E. De Cristofaro, M. A. Sasse. "They brought in the horrible key ring thing Analysing the Usability of Two-Factor Authentication in UK Online Banking 9th NDSS Workshop on Usable Security (USEC 2015) 7

Hypotheses Context of use, motivation, frequency of use significantly affect perceived usability In online banking, even though there s only one primary task, no one-size-fits-all 8

Two Studies 1. E. De Cristofaro, H. Du, J. Freudiger, G. Norcie. Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication 8th NDSS Workshop on Usable Security (USEC 2014) 2. K. Krol, E. Philippou, E. De Cristofaro, M. A. Sasse. "They brought in the horrible key ring thing Analysing the Usability of Two-Factor Authentication in UK Online Banking 9th NDSS Workshop on Usable Security (USEC 2015) 9

Pre-Study Interviews Goal Understand popular 2FA in use, context and motivations Participant Recruitment Mailing lists and social media (Google+ and Facebook) Announced paid interviews for user study on authentication Online screening survey to know more about potential participants 9 out of 29 mostly from Silicon Valley, familiar with 2FA 10

Participants Profile Selected 9/29 from pre-screening survey Age: 21 to 49 Gender: 5 males, 4 females Education: High school to PhD Security: 5/9 background in computer security 11

Methodology Interviews 1 on 1 meeting, $10 Amazon Gift Card compensation Questions 1. Which 2FA have you used? (Adoption) 2. How does 2FA work? (Understanding) 3. Why do you use 2FA? (Motivation) PIN from a paper/card Digital certificate RSA token code Verisign token code Paypal token code Google Authenticator PIN received by SMS/email USB token Smartcard 4. Recall last time you used 2FA? (Familiarity) 12

Findings Adoption Security token Motivation Context Forced to Work Incentivized Personal Wanted to Financial I have to use it to work from home SMS or email Smartphone app I use 2FA to obtain higher limits on online banking transactions I use 2FA to avoid getting hacked 13

Quantitative Survey Two main challenges How to recruit participants? What questions to ask? Existing usability metrics SUS - System Usability Scale (10 questions) QUIS - Questionnaire for User Interface Satisfaction (27 questions) PUEU - Perceived Usefulness and Ease of Use (12 questions) CSUQ - Computer System Usability Questionnaire (19 questions) Software focused, not for 2FA technologies 14

Usability Questions (Likert) Quick Concentration Helpful User Friendly Not Enjoy Convenient Reuse Stressful Enjoy Need Instruction Secure Trust Frustrating Match Easy J. Bonneau, etc. The quest to replace passwords: a Framework for comparative evaluation of web authentication schemes. IEEE Symposium on Security and Privacy, 2012. A. Karole, etc. A comparative usability evaluation of traditional password managers. In ICISC, 2011. 15

User Distribution Online survey 219 participants from Mechanical Turk SUS and 15 other questions on usability Group 2FA Technologies Used # of Participants 1 Token 11 2 Email/SMS 77 3 App 7 4 Token & Email/SMS 29 5 Token & App 3 6 Email/SMS & App 50 7 All three 41 Total 219 16

Results Adoption and Context Adoption SMS/Email is the most popular 2FA (89.95%) App (45.20%) Token (24.20%) Context Χ2(4, 582)= 65.18, p<.0001) 17

Results Motivations Χ2(4, 775)= 14.68, p<.0001) 18

Results Exploratory Factor Analysis Ease of Use Cognitive Efforts Quick Need Instruction Convenient Concentration Trus t Helpful Enjoy Stressful Secure Reuse Match Not Enjoy Frustrating Trustworthiness User Friendly SUS 19

Usability Comparison 20

Usability Comparison Does context motivation technology impact usability? Via MANOVA analysis Answer... No 21

Usability Comparison Some usability differences w.r.t age and gender: Email/SMS and Token users (group 4) The elderly (Md=3) need more Cognitive Efforts (Md=2, p=0.003) Email/SMS and App users (group 6) The elderly (Md=5.5) find that 2FA are less trustworthy (Md=6, p=.0007) Users of all 3 technologies (group 7) Females (Md=2.75) need more Cognitive Efforts (Md=2.0, p=.001) 22

Hypotheses Context of use, motivation, frequency of use significantly affect perceived usability Somewhat negative result In online banking, even though there s only one primary task, no one-size-fits-all 23

Two Studies 1. E. De Cristofaro, H. Du, J. Freudiger, G. Norcie. Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication 8th NDSS Workshop on Usable Security (USEC 2014) 2. K. Krol, E. Philippou, E. De Cristofaro, M. A. Sasse. "They brought in the horrible key ring thing Analysing the Usability of Two-Factor Authentication in UK Online Banking 9th NDSS Workshop on Usable Security (USEC 2015) 24

2FA landscape in the UK Hardware tokens: Card Reader, SecureKey SMS Phone call Mobile phone app 25

Participants 66 people filled in a pre-screen, 21 were chosen 11F / 10M, age range: 19-69 (mean: 32.4, SD=10.87) 2FA technologies used: Card Reader: 16 SecureKey: 9 OTP via SMS: 5 OTP over the phone: 4 OTP via smartphone app: 3 26

Study stages 1. Preliminary interviews (~30mins/ 5) 2. Diary (10-12 days) 3. Final interviews (~30mins/ 15) 27

Interview results: Hardware tokens Advantages Disadvantages Easy to use (4) Needs to remember to bring it (7) Portable (4) Easy to incorporate into everyday life (4) Inconvenient (5) Frustrating to use (4) Irritating (3) It s OK when I am at home, but when you are at work and you are pretending you are actually doing work when you are actually checking on your account, then you have to bring out this calculator thing and it s kind of obvious you are not doing work. I d rather have something where I am just on the screen and it s lot quicker. (P11) 28

Authentication terminology Is it a passphrase or passcode or key phrase what they need? [chuckling] I think it is slightly confusing. Although I m experienced [...], it s frustrating. (P08) Interruption to the primary task If I am in a rush, I maybe misspell my surname or I do not enter the card number correctly [ ] I ll have to get myself together mentally and let s say Focus! Whatever is in your mind, forget it. (P14) 29

Other problems Assigned usernames prevented participants from logging in Cumbersome resets led to simpler credentials 30

Use of drop-down menus 31

Mental models Credentials are checked manually by bank employees Where do OTPs come from? Card reader needs protection, information can be stolen off it Security rituals reassure users (e.g., anti-virus, hiding the token, using password as memorable answer) 32

Ideal authentication Biometrics! I think, in a few 100 years from now you ll just put your finger on a machine and it reads your fingerprint. Today, it s slow you know fast is good! The faster the better. 33

Implicit authentication Reliability concerns (5) Privacy concerns (6) I could see implicit working but you ll probably run to privacy issues about that: Who s doing the software? How s the monitoring done? Who gets the information from the monitoring? blah blah blah. That would be the real issue. (P10) 34

Diary results 17 participants kept an authentication diary for approx. 11 days 90 entries, 5.29 per person (1-15, SD=3.99) There were problems on 12 occasions (13.3%) Mistyped credentials (5) Misplaced tokens (2) Wrong memorable answer, wrong sequence of steps, forgotten username 35

Participant satisfaction Lower when they generated an OTP to authenticate Lower the more pieces of information they had to enter Lower with banks that required a token to generate an OTP 36

Recommendations Give customers choice of authentication options Unify wording for credential names Check your security features actually work Use of drop-down menus Providing selected characters out of order 37

Next steps... Threat modeling Economic aspects Behavioral biometrics as 2nd factor Contextual security and 2FA 38

Thanks to Honglu Du Julien Freudiger Kat Krol Eleni Philippou M. Angela Sasse Victoria Bellotti 39