28
Ken Reese, Trevor Smith, Jonathan Dutson , Jonathan Armknecht, Jacob Cameron, and Kent Seamons A Usability Study of Five Two-Factor Authentication Methods

A Usability Study of Five Two-Factor Authentication [email protected]. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons

A Usability Study of Five Two-Factor Authentication Methods

Page 2: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Passwords: Everywhere, but…

https://media.giphy.com/media/dxfdvOobztBviVmYbM/giphy.gif

Page 3: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Two-Factor Authentication

Something you know

Something you have

Something you are

Page 4: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Five Two-Factor Authentication Methods

SMS

TOTP

Pre-generated codes

Push notifications

U2F security keys

Page 5: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Something you have…

Page 6: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Goal:Perform a comparative usability study of five 2FA methods

Page 7: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Previous 2FA User Studies

2FA banking studies

• Piazzalunga [2005], Weir [2009, 2010], Gunson [2011]

Security key setup

• Das [FC 2018]

Setup of four 2FA methods

• Acemyan [HFES 2018]

Day-to-day usability

• Krol [USEC 2015], Reynolds [S&P 2018]

Page 8: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Study DesignCompare five factors across a single application

Reduce confounding factors

Gather timing data

Examine setup and day-to-day usability independently

Avoid bias

Page 9: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Two Parts1. Two-week between-subjects usability study

2. Within-subjects laboratory setup study

Page 10: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Two Week Study Methodology

72 PARTICIPANTS

(6 GROUPS OF 12)

SIMULATED ONLINE BANKING WEBSITE

12 BANKING TASKS

Page 11: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Findings Quantitative

Qualitative

https://media.giphy.com/media/xGlmLbM8sOcSc/giphy.gif

Page 12: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Timing

Page 13: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Timing

Page 14: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

SUS

Page 15: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Qualitative Results

Page 16: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Security and Inconvenience

Page 17: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Availability of Second-factor Device

Page 18: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Not a Target

Page 19: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Day-to-day Usability?

https://media.giphy.com/media/cN3TDDF02WCT6/giphy.gif

Page 20: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Limitations

University population

Simulated banking environment

2FA for every authentication attempt

Page 21: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Setup Study Methodology30 participants

Setup each 2FA method

Used counterbalancing to account for ordering effects

Page 22: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Setup Study: Timing Data

Page 23: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Setup Study: SEQ Scores

Page 24: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Setup FailuresTOTP

Scanning QR code

U2FPop up permission

Page 25: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Setup Usability?

https://media.giphy.com/media/cXMbxzMdXdVGwDZbyS/giphy.gif

Page 26: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Limitations

University population

Provider-specific setup implementation

Unfamiliarity with provided phone

Page 27: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Conclusion

Well-implemented 2FA methods may be set up and used without major difficulty

Home users may not always have access to second-factor device

Users differentiate between high and low value accounts

Time to authenticate decreases with familiarity (U2F, TOTP)

Faster authentication does not necessarily mean higher usability

Page 28: A Usability Study of Five Two-Factor Authentication Methods...jonathan@isrl.byu.edu. Title: A Usability Study of Five Two-Factor Authentication Methods Author: Jonathan Dutson Created

Thank you

[email protected]