Detecting local graphic password deciphering attacks

作者: Bruce McCorkendale , William E. Sobel

DOI:

关键词:

摘要: A mechanism for using a graphic password test while providing the ability detecting attempts by programs to decipher malicious attack is disclosed. An access module provides prompt an entity attempting protected resource. image-substitution first or second image (images display and password, respectively). programmatic interface that displayed on computer screen can be modified periodically provide program different from human user. receiving receives in response determination determines if password. When received, it likely malware attempt at bypassing test. analysis responds e.g., collecting information about attempted access.

参考文章(8)
David J. Steeves, Mwende Window Snyder, Secure online transactions using a captcha image as a watermark ,(2005)
Ari Juels, Niklas Frykholm, Robust visual passwords ,(2001)
Binyamin Pinkas, Tomas Sander, Secure authentication systems and methods ,(2007)
Robert E. Tarjan, Binyamin Pinkas, Tomas Sander, Stuart A. Haber, Establishing a secure channel with a human user ,(2003)
Micah C. Rupersburg, Robert L. Rounthwaite, Joshua T. Goodman, Dean A. Slawson, David E. Heckerman, Nathan D. Howell, John D. Mehr, Feedback loop for spam prevention ,(2004)
B. Marc Lindenhurst Manza, D. Marc Del Mar Boroditsky, Generalized user identification and authentication system ,(1998)
Heung-Yeung Shum, Shujun Li, Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI IACR Cryptology ePrint Archive. ,vol. 2005, pp. 268- ,(2005)
Christopher Dalton, Matthew Willamson, Computer access control ,(2005)