authentication melee a usability analysis of seven web authentication systems scott ruoti, brent...

34
AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham Young University http://isrl.byu.edu World Wide Web Conference 2015, Florence, Italy

Upload: avice-armstrong

Post on 29-Dec-2015

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

AUTHENTICATION MELEEA Usability Analysis of Seven Web Authentication Systems

Scott Ruoti, Brent Roberts, Kent Seamons

Internet Security Research Lab

Brigham Young University

http://isrl.byu.edu

World Wide Web Conference 2015, Florence, Italy

Page 2: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Acknowledge co-authors

Scott Ruoti Brent Roberts

Page 3: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Passwords Rule the Web• Deployed everywhere• Well-known security problems• Many proposed systems to replace them• Passwords have combination of usability, deployability, and security that is

hard to beat• Bonneau et al. The Quest to Replace Passwords, IEEE Security & Privacy 2012

May 20, 2015 WWW 2015, Florence, Italy 3

Page 4: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Our Research Agenda• Develop Single Sign-on Protocols using Secure Remote Password (SRP)• Analyze security and usability of our system• We wanted to leverage experience from prior work in usable authentication

• What are the most usable authentication systems?• How to measure the usability of an authentication system?

May 20, 2015 WWW 2015, Florence, Italy 4

Page 5: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Where Are We?

• Looked at systems proposed in research literature

• No clear best system• Lack of empirical analysis

May 20, 2015 WWW 2015, Florence, Italy 5

Page 6: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Where Are We?

• Looked at systems proposed in research literature

• No clear best system• Lack of empirical analysis• Limitations

• Proposals are not evaluated using standard usability metrics

• Proposals are not compared against each other

May 20, 2015 WWW 2015, Florence, Italy 6

Page 7: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Security vs. Usability

Big Dog vs. little dog

May 20, 2015 WWW 2015, Florence, Italy 7

Page 8: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Where Do We Want to Be?• Elevate usability on an equal footing with security

• Truly secure systems must be both secure and usable

• Determine which proposals have the best overall usability• Use a standard metric• Head-to-head comparison of proposals• Identify best in class systems• Establish a basis for evaluating new proposals

• New proposals should not receive serious attention until they demonstrate acceptable usability• Security researchers can be poor predictors of usability

May 20, 2015 WWW 2015, Florence, Italy 8

Page 9: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Authentication Melee• Conducted empirical analysis of seven web authentication systems

• Federated single sign-on: Google OAuth 2.0, Facebook Connect, Mozilla Persona• Email-based: SAW, Hatchet• QR Code-based: WebTicket, Snap2Pass

• Used the System Usability Scale (SUS) as a standard usability metric• Organized systems into head-to-head competitions

May 20, 2015 WWW 2015, Florence, Italy 9

Page 10: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Tournament Structure• Difficult to do a full combinatorial study

• If each participant tests two systems, it requires a large number of participants• If each participant tests all systems, it can lead to study fatigue

• Instead we structured our study into a tournament• First round based on type of authentication system

May 20, 2015 WWW 2015, Florence, Italy 10

Page 11: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Federated Single Sign-on• Authentication is centralized into a single identifying party• The website relies on the identifying party to verify the identity of users• Systems

• Google OAuth 2.0• Widespread

• Facebook Connect• Widespread

• Mozilla Persona• Identifying party only handles authentication

May 20, 2015 WWW 2015, Florence, Italy 11

Page 12: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Email-based• Single sign-on where all email providers are identity providers• Users verify their identity by demonstrating their ability to send or receive

email• Systems

• SAW• Click on a link sent in an email message

• Hatchet• Enter a code sent in an email message

May 20, 2015 WWW 2015, Florence, Italy 12

Page 13: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

QR Code-based

• Encodes authentication credentials into a QR code• Two recent systems

• WebTicket• Snap2Pass

May 20, 2015 WWW 2015, Florence, Italy 13

Page 14: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

QR Code-based

• Encodes authentication credentials into a QR code

• Two recent systems• WebTicket

• Credentials encoded into a token that is printed out

• Token is shown to the website to authenticate the user

May 20, 2015 WWW 2015, Florence, Italy 14

Page 15: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

QR Code-based

• Encodes authentication credentials into a QR code

• Two recent systems• WebTicket

• Credentials encoded into a token that is printed out

• Token is shown to the website to authenticate the user

• Snap2Pass• The user’s phone acts as the identity

provider• The website sends information to the

phone through QR codes

May 20, 2015 WWW 2015, Florence, Italy 15

Page 16: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Methodology• Four studies in total

• Federated single sign-on: 24 participants• Email-based: 18 participants• QR code-based: 25 participants• Championship round: 30 participants

• Participants were from BYU• Most were undergraduates• Most were between 18 – 24 years old• On average rated themselves as having intermediate technical skills

May 20, 2015 WWW 2015, Florence, Italy 16

Page 17: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Study design• Built two websites

• Forum website• Bank website

• Implemented the seven authentication systems• Existing implementations unavailable• Consistent look and functionality

• Six tasks• 2 registration tasks• 4 authentication tasks• Repeated same tasks for each system tested

• Questionnaire• After each system• After study as a whole

May 20, 2015 WWW 2015, Florence, Italy 17

Page 18: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

System Usability Scale• Single numeric score between 0 and 100 (higher is better)• Calculated based on user responses to 10 Likert-scale questions• Individual participants’ SUS scores are averaged to give the overall SUS score

May 20, 2015 WWW 2015, Florence, Italy 18

Page 19: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

What Does the SUS Score Mean?• If a system has a SUS score of 75, what does that mean?• Bangor et al. examined SUS in over 200 usability studies and developed an

adjective-oriented interpretation of a SUS score

May 20, 2015 WWW 2015, Florence, Italy 20

Page 20: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Results: Federated Single Sign-on• Winner: three way tie

• SUS scores between 71 and 72• Good

AcceptableC grade

• Chose Google OAuth 2.0 to advance

• Mozilla Persona took longer to authenticate• Difference was not mentioned in participants

qualitative responses

• Trust issues with Google OAuth 2.0 and Facebook Connect

May 20, 2015 WWW 2015, Florence, Italy 21

System SUS Score

Google 72.0

Facebook 71.4

Mozilla 71.8

Page 21: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Results: Email-based• Winner: SAW • Both systems performed poorly• SAW

• OKLow-marginal acceptabilityD grade

• Participants disliked checking their email

• Hatchet• OK

Low-marginal acceptabilityF grade

• Users don’t want to leave their browser

May 20, 2015 WWW 2015, Florence, Italy 22

System SUS Score

SAW 61.0

Hatchet 53.5

Page 22: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Results: QR Code-based• Winner: Snap2Pass • WebTicket

• OKLow-marginal acceptabilityD grade

• Snap2Pass• Good

AcceptableB grade

May 20, 2015 WWW 2015, Florence, Italy 23

System SUS Score

WebTicket 57.9

Snap2Pass 75.7

Page 23: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Championship Round• Participants: Google OAuth 2.0, SAW,

Snap2Pass• Google OAuth 2.0 and Snap2Pass tie• SUS scores consistent with earlier scores• Overall winners:

• Federated single sign-on• Snap2Pass

May 20, 2015 WWW 2015, Florence, Italy 24

System SUS Score

Google 75.0

SAW 53.2

Snap2Pass 68.4

Page 24: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Championship Round• Participants were asked how the systems

compared to each other and to passwords

May 20, 2015 WWW 2015, Florence, Italy 25

Page 25: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

System Usability Scale• Repeatable results - consistent SUS scores between studies• Good predictor of overall preference

• More accurate than mean time to authenticate

• Recommendation: All new proposals be evaluated using SUS• New system proposals should not be seriously considered until they receive a score of at

least 70

May 20, 2015 WWW 2015, Florence, Italy 26

Page 26: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Qualitative Feedback• Users provided feedback via open-ended survey questions and in-person

interviews• The results provide interesting user perspectives on authentication

May 20, 2015 WWW 2015, Florence, Italy 27

Page 27: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Transparency• In usable security, transparency refers to hiding security details• Transparency increases usability• Tested this by modifying SAW to automate token retrieval

• Used participants from second usability study (email-based)• Increased SUS score by 12.1 points• Statistically significant difference (p=0.01)

May 20, 2015 WWW 2015, Florence, Italy 28

Page 28: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Transparency• Transparency can result in a lack of trust

• Similar phenomenon in our secure email research• Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes

Ruoti et al., SOUPS 2013

“I would like to understand more about how it works up-front. It doesn't feel secure.”

“I think it was very straightforward to use. Once again like with the other system, perhaps an explanation of how it protected information would give me more confidence in using it.”

May 20, 2015 WWW 2015, Florence, Italy 29

Page 29: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Single Sign-on Protocols• Users liked the speed and convenience• Users recognized the risk of putting all their eggs in one basket

• Suggested augmenting SSO with low-entropy passwords at the website• Adds security if identity provider account is compromised

May 20, 2015 WWW 2015, Florence, Italy 30

Page 30: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Single Sign-on Protocols• Reputation of the identity provider is important

• Desire dedicated identity providers

“I would be worried about security. I've heard that Facebook is ‘relatively’ easy to hack. I would want to be sure that it was all secure before I started using it.”

“I trust Google with my passwords.”

“I would make an account separate from my social network and mail specifically for functions like banking etc.”

May 20, 2015 WWW 2015, Florence, Italy 31

Page 31: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

The Coolness Factor• Participants were most willing to adopt systems that they described as “cool”

“Man was that cool!”

“Also, the feel of it made me enjoy doing it. I felt technologically literate and the app felt futuristic as a whole, which I enjoyed.”

May 20, 2015 WWW 2015, Florence, Italy 32

Page 32: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Biometrics• We did not test or mention biometrics in our study• Users consistently mentioned them as being a “cool” way to authenticate

• Indication that users may be accepting of viable biometric solutions

“retinal scanner so i just sit in front of my computer and it scans my eye. dope.”

“The ideal system would scan some part of my body - either eye or thumb - because these are literally ALWAYS with me.”

May 20, 2015 WWW 2015, Florence, Italy 33

Page 33: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Conclusion• We tested seven web authentication systems

• Found federated single sign-on and Snap2Pass to be the most usable• First empirical analysis of a heterogeneous collection of authentication proposals

• System Usability Scale• SUS is a good measure of usability for authentication proposals• Repeatable results that allow for comparing heterogeneous systems• Recommend it be used for all new authentication proposals• Minimum score of 70 for serious consideration

• Future work• Exploring the tradeoffs of transparency in authentication• Low-entropy passwords with single sign-on• Biometric-based web authentication

May 20, 2015 WWW 2015, Florence, Italy 34

Page 34: AUTHENTICATION MELEE A Usability Analysis of Seven Web Authentication Systems Scott Ruoti, Brent Roberts, Kent Seamons Internet Security Research Lab Brigham

Questions?

May 20, 2015 WWW 2015, Florence, Italy 35

Contact: [email protected]