TwoKind authentication: usable authenticators for untrustworthy environments

  • Authors:
  • Katelin Bailey;Linden Vongsathorn;Apu Kapadia;Chris Masone;Sean W. Smith

  • Affiliations:
  • Dartmouth College, Hanover, NH;Dartmouth College, Hanover, NH;Dartmouth College, Hanover, NH;Dartmouth College, Hanover, NH;Dartmouth College, Hanover, NH

  • Venue:
  • Proceedings of the 3rd symposium on Usable privacy and security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The ease with which a malicious third party can obtain a user's password when he or she logs into Internet sites (such as bank or email accounts) from an insecure computer creates a substantial security risk to private information and transactions. For example, a malicious administrator at a cybercafe, or a malicious user with sufficient access to install key loggers at a kiosk, can obtain users' passwords easily. Even when users do not trust the machines they are using, many of them are faced with the prospect of accessing their accounts with a single level of privilege. To address this problem, we propose a system based on two modes of authentication--default and restricted. Users can signal to the server whether they are in an untrusted environment so that the server can log them in under restricted privileges that allow them to perform basic actions that cause no serious damage if the session or their password is compromised.