Loading [MathJax]/extensions/MathMenu.js
A Cognitive Model for the Forensic Recovery of End-User Passwords | IEEE Conference Publication | IEEE Xplore

A Cognitive Model for the Forensic Recovery of End-User Passwords


Abstract:

Despite the existence of a number of advanced authentication mechanisms such as two- factor tokens, biometrics etc., the use of passwords is still the most popular means ...Show More

Abstract:

Despite the existence of a number of advanced authentication mechanisms such as two- factor tokens, biometrics etc., the use of passwords is still the most popular means of authenticating users in a computing system. Consequently, we need to generate and remember a large number of passwords, and these passwords need to be as strong as the assets they protect. During the course of a forensic examination a computer forensics analyst may come across a number of situations where the recovery of passwords is required, either in order to access a particular user account, or to unlock encrypted or otherwise obfuscated digital content. In this paper we create a cognitive model to describe the creation of end-user generated passwords that may be applied particularly during an attempt to forensically recover such passwords. We propose that it may be feasible to recover a password by reversing the logic of its creation, taking into account contextual and other parameters, instead of applying computationally expensive brute force.
Date of Conference: 27-28 August 2007
Date Added to IEEE Xplore: 04 September 2007
ISBN Information:
Conference Location: Karlovassi, Greece
References is not available for this document.

1. Introduction

There are several ways for users to authenticate themselves in computing systems. Besides the standard use of passwords there are many advanced mechanisms or methods for users to login into a system. Those technologies include the use of smartcards, remote frequency identification tags, biometrics, pattern recognition, picture-based authentication (i.e. select a number of pictures using the right sequence, or point out a specific pixel location on a picture) etc. ([1], [2], [3]). Most of these methods however are prone to failure, albeit at a low rate and thus, along with any of the above authentication methods usually comes a password option that will provide an alternative for authenticating the user. This fact makes the recovery of such passwords an important issue, especially for reasons of business continuity and in the context discussed in this paper, for incident investigation.

Select All
1.
Angeli De, A. Coventry, L. Johnson and G. Renaud, "K. 2005. Is a picture really worth a thousand words? On the feasibility of graphical authentication systems", International Journal of Human-Computer Studies special issue: HCI research on Privacy and Security, vol. 63, no. 1–2, pp. 128-152, July 2005.
2.
Renaud Karen, "Visuo-Biometric Authentication Mechanism for Older Users", Proc British HCI., pp. 167-182, September 2005.
3.
Liddell Jim, Renaud Karen and Antonella De Angeli, "Using a combination of sound and Images to authenticate web users", Short Paper. HCI 2003. 17th Annual Human Computer Interaction Conference. Designing for Society. Bath England, pp. 8-12, Sept, 2003.
4.
P. Oechslin, "Making a Faster Cryptanalytic Time-Memory Trade-Off", available on-line, June 2007.
5.
AccessData Forensic Toolkit software.
6.
lA. Cazier, "How Secure is Your Password? An Analysis of E-Commerce Passwords and their Crack Times", JISSec, vol. 2, no. 3, pp. 69-82, 2006.
7.
Schneier Bruce, "2007 A weblog covering security and security technology".
8.
"How to Remember Your Password".
9.
"Microsoft Online Security Tips and Advice 2006".
10.
"Sony Ericsson".
11.
K Renaud, "2005 Passwords Passwords Everywhere and Not a Minute to Think", Safeguarding National Infrastructures: Integrated Approaches to Failure in Complex Networks University of Glasgow.
12.
Y. Miyata and D. Norman, "1986 Phychological issues in support of multiple activities", Erlbaum Associates Publishers Hilldale New Jersey.
13.
G. Fragkos, K. Xynos and A. Blyth, "2005 The use of computers idle-time and parallel processing over a network to perform password threat assessment", 4th European Conference on Information Warfare and Security University of Glamorgan.

References

References is not available for this document.