Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond
dc.contributor.author | Khan, Hassan | |
dc.contributor.author | Ceci, Jason | |
dc.contributor.author | Stegman, Jonah | |
dc.contributor.author | Aviv, Adam J. | |
dc.contributor.author | Dara, Rozita | |
dc.contributor.author | Kuber, Ravi | |
dc.date.accessioned | 2021-03-25T17:22:20Z | |
dc.date.available | 2021-03-25T17:22:20Z | |
dc.date.issued | 2020-12 | |
dc.description | ACSAC '20: Annual Computer Security Applications Conference, December 2020, Pages 249–262 | en_US |
dc.description.abstract | Personal Identification Numbers (PINs) are widely used as an access control mechanism for digital assets (e.g., smartphones), financial assets (e.g., ATM cards), and physical assets (e.g., locks for garage doors or homes). Using semi-structured interviews (n=35), participants reported on PIN usage for different types of assets, including how users choose, share, inherit, and reuse PINs, as well as behaviour following the compromise of a PIN. We find that memorability is the most important criterion when choosing a PIN, more so than security or concerns of reuse. Updating or changing a PIN is very uncommon, even when a PIN is compromised. Participants reported sharing PINs for one type of asset with acquaintances but inadvertently reused them for other assets, thereby subjecting themselves to potential risks. Participants also reported using PINs originally set by previous homeowners for physical devices (e.g., alarm or keypad door entry systems). While aware of the risks of not updating PINs, this did not always deter participants from using inherited PINs, as they were often missing instructions on how to update them. Given the expected increase in PIN-protected assets (e.g., loyalty cards, smart locks, and web apps), we provide suggestions and future research directions to better support users with multiple digital and non-digital assets and more secure human-device interaction when utilizing PINs. | en_US |
dc.description.sponsorship | We thank Flynn Wolf, Harshvardhan Verma, and Kassidy Marsh for their feedback on the survey and assistance. This material is based upon work supported by NSERC under Grant No. RGPIN2019-05120 and the National Science Foundation under Grants No.1845300. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies | en_US |
dc.description.uri | https://dl.acm.org/doi/10.1145/3427228.3427240 | en_US |
dc.format.extent | 14 pages | en_US |
dc.genre | conference papers and proceedings | en_US |
dc.identifier | doi:10.13016/m2adao-0sdy | |
dc.identifier.citation | Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, and Ravi Kuber. 2020. Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. In Annual Computer Security Applications Conference (ACSAC '20). Association for Computing Machinery, New York, NY, USA, 249–262. DOI:https://doi.org/10.1145/3427228.3427240 | en_US |
dc.identifier.uri | https://doi.org/10.1145/3427228.3427240 | |
dc.identifier.uri | http://hdl.handle.net/11603/21215 | |
dc.language.iso | en_US | en_US |
dc.publisher | ACM | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Information Systems Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.subject | Personal Identification Numbers (PIN) | en_US |
dc.subject | ATM cards | en_US |
dc.subject | digital and non-digital assets | en_US |
dc.subject | access control mechanism | en_US |
dc.title | Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond | en_US |
dc.type | Text | en_US |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 2.56 KB
- Format:
- Item-specific license agreed upon to submission
- Description: