The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (2012)
San Francisco, CA USA
May 20, 2012 to May 23, 2012
ISSN: 1081-6011
ISBN: 978-0-7695-4681-0
pp: 553-567
F. Stajano , Univ. of Cambridge, Cambridge, UK
P. C. van Oorschot , Carleton Univ., Ottawa, ON, Canada
C. Herley , Microsoft Res., Redmond, WA, USA
J. Bonneau , Univ. of Cambridge, Cambridge, UK
ABSTRACT
We evaluate two decades of proposals to replace text passwords for general-purpose user authentication on the web using a broad set of twenty-five usability, deployability and security benefits that an ideal scheme might provide. The scope of proposals we survey is also extensive, including password management software, federated login protocols, graphical password schemes, cognitive authentication schemes, one-time passwords, hardware tokens, phone-aided schemes and biometrics. Our comprehensive approach leads to key insights about the difficulty of replacing passwords. Not only does no known scheme come close to providing all desired benefits: none even retains the full set of benefits that legacy passwords already provide. In particular, there is a wide range from schemes offering minor security benefits beyond legacy passwords, to those offering significant security benefits in return for being more costly to deploy or more difficult to use. We conclude that many academic proposals have failed to gain traction because researchers rarely consider a sufficiently wide range of real-world constraints. Beyond our analysis of current schemes, our framework provides an evaluation methodology and benchmark for future web authentication proposals.
INDEX TERMS
Authentication, Usability, Privacy, Proposals, Educational institutions, software engineering, authentication, computer security, human computer interaction, security and usability, deployability, economics
CITATION

F. Stajano, P. C. van Oorschot, C. Herley and J. Bonneau, "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes," 2012 IEEE Symposium on Security and Privacy(SP), San Francisco, CA USA, 2012, pp. 553-567.
doi:10.1109/SP.2012.44
193 ms
(Ver 3.3 (11022016))