Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond

dc.contributor.authorKhan, Hassan
dc.contributor.authorCeci, Jason
dc.contributor.authorStegman, Jonah
dc.contributor.authorAviv, Adam J.
dc.contributor.authorDara, Rozita
dc.contributor.authorKuber, Ravi
dc.date.accessioned2021-03-25T17:22:20Z
dc.date.available2021-03-25T17:22:20Z
dc.date.issued2020-12
dc.descriptionACSAC '20: Annual Computer Security Applications Conference, December 2020, Pages 249–262en_US
dc.description.abstractPersonal Identification Numbers (PINs) are widely used as an access control mechanism for digital assets (e.g., smartphones), financial assets (e.g., ATM cards), and physical assets (e.g., locks for garage doors or homes). Using semi-structured interviews (n=35), participants reported on PIN usage for different types of assets, including how users choose, share, inherit, and reuse PINs, as well as behaviour following the compromise of a PIN. We find that memorability is the most important criterion when choosing a PIN, more so than security or concerns of reuse. Updating or changing a PIN is very uncommon, even when a PIN is compromised. Participants reported sharing PINs for one type of asset with acquaintances but inadvertently reused them for other assets, thereby subjecting themselves to potential risks. Participants also reported using PINs originally set by previous homeowners for physical devices (e.g., alarm or keypad door entry systems). While aware of the risks of not updating PINs, this did not always deter participants from using inherited PINs, as they were often missing instructions on how to update them. Given the expected increase in PIN-protected assets (e.g., loyalty cards, smart locks, and web apps), we provide suggestions and future research directions to better support users with multiple digital and non-digital assets and more secure human-device interaction when utilizing PINs.en_US
dc.description.sponsorshipWe thank Flynn Wolf, Harshvardhan Verma, and Kassidy Marsh for their feedback on the survey and assistance. This material is based upon work supported by NSERC under Grant No. RGPIN2019-05120 and the National Science Foundation under Grants No.1845300. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding agenciesen_US
dc.description.urihttps://dl.acm.org/doi/10.1145/3427228.3427240en_US
dc.format.extent14 pagesen_US
dc.genreconference papers and proceedingsen_US
dc.identifierdoi:10.13016/m2adao-0sdy
dc.identifier.citationHassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, and Ravi Kuber. 2020. Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. In Annual Computer Security Applications Conference (ACSAC '20). Association for Computing Machinery, New York, NY, USA, 249–262. DOI:https://doi.org/10.1145/3427228.3427240en_US
dc.identifier.urihttps://doi.org/10.1145/3427228.3427240
dc.identifier.urihttp://hdl.handle.net/11603/21215
dc.language.isoen_USen_US
dc.publisherACMen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectPersonal Identification Numbers (PIN)en_US
dc.subjectATM cardsen_US
dc.subjectdigital and non-digital assetsen_US
dc.subjectaccess control mechanismen_US
dc.titleWidely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyonden_US
dc.typeTexten_US

Files

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: