User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people’ lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software 1 Graduate School of Information, Yonsei University, Seoul, 120-749, Korea. * Corresponding author (taekyoung@yonsei.ac.kr) [Received 31 January 2014, Reviewed 18 February 2014, Accepted 9 April 2014] ☆ 본 연구는 미래창조과학부 및 한국산업기술평가관리원의 산 업융합원천기술개발사업(정보통신)[10039180, 모바일 환경하 에서 모바일 인증과 보안 강화를 위해 직관적이며 사용하기 편하고 안전한 인간-컴퓨터 상호작용(HCI) 기반 Usable Security 원천기술 개발]과 2012년도 정부(교육부)의 재원으 로 한국연구재단의 지원을 받아 수행된 기초연구사업(No. NRF-2012R1A1B3000965)의 일환으로 수행하였음. ☆ 본 논문은 2014년도 인터넷정보학회 춘계학술발표대회 우수 논문 추천에 따라 확장 및 수정된 논문임. ISSN 1598-0170 (Print) ISSN 2287-1136 (Online) http://www.jksii.or.kr http://dx.doi.org/10.7472/jksii.2014.15.3.79 사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 – 사용자 경험 및 HCI의 관점에서 8
Read full abstract