Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Blase Ur is active.

Publication


Featured researches published by Blase Ur.


computer and communications security | 2013

Measuring password guessability for an entire university

Michelle L. Mazurek; Saranga Komanduri; Timothy Vidas; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Patrick Gage Kelley; Richard Shay; Blase Ur

Despite considerable research on passwords, empirical studies of password strength have been limited by lack of access to plaintext passwords, small data sets, and password sets specifically collected for a research study or from low-value accounts. Properties of passwords used for high-value accounts thus remain poorly understood. We fill this gap by studying the single-sign-on passwords used by over 25,000 faculty, staff, and students at a research university with a complex password policy. Key aspects of our contributions rest on our (indirect) access to plaintext passwords. We describe our data collection methodology, particularly the many precautions we took to minimize risks to users. We then analyze how guessable the collected passwords would be during an offline attack by subjecting them to a state-of-the-art password cracking algorithm. We discover significant correlations between a number of demographic and behavioral factors and password strength. For example, we find that users associated with the computer science school make passwords more than 1.5 times as strong as those of users associated with the business school. while users associated with computer science make strong ones. In addition, we find that stronger passwords are correlated with a higher rate of errors entering them. We also compare the guessability and other characteristics of the passwords we analyzed to sets previously collected in controlled experiments or leaked from low-value accounts. We find more consistent similarities between the university passwords and passwords collected for research studies under similar composition policies than we do between the university passwords and subsets of passwords leaked from low-value accounts that happen to comply with the same policies.


symposium on usable privacy and security | 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases

Richard Shay; Patrick Gage Kelley; Saranga Komanduri; Michelle L. Mazurek; Blase Ur; Timothy Vidas; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor

Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be hard to remember. Passphrases, space-delimited sets of natural language words, have been suggested as both secure and usable for decades. In a 1,476-participant online study, we explored the usability of 3- and 4-word system-assigned passphrases in comparison to system-assigned passwords composed of 5 to 6 random characters, and 8-character system-assigned pronounceable passwords. Contrary to expectations, system-assigned passphrases performed similarly to system-assigned passwords of similar entropy across the usability metrics we examined. Passphrases and passwords were forgotten at similar rates, led to similar levels of user difficulty and annoyance, and were both written down by a majority of participants. However, passphrases took significantly longer for participants to enter, and appear to require error-correction to counteract entry mistakes. Passphrase usability did not seem to increase when we shrunk the dictionary from which words were chosen, reduced the number of words in a passphrase, or allowed users to change the order of words.


human factors in computing systems | 2012

Tag, you can see it!: using tags for access control in photo sharing

Peter F. Klemperer; Yuan Liang; Michelle L. Mazurek; Manya Sleeper; Blase Ur; Lujo Bauer; Lorrie Faith Cranor; Nitin Gupta; Michael K. Reiter

Users often have rich and complex photo-sharing preferences, but properly configuring access control can be difficult and time-consuming. In an 18-participant laboratory study, we explore whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. We find that (a) tags created for organizational purposes can be repurposed to create efficient and reasonably accurate access-control rules; (b) users tagging with access control in mind develop coherent strategies that lead to significantly more accurate rules than those associated with organizational tags alone; and (c) participants can understand and actively engage with the concept of tag-based access control.


human factors in computing systems | 2014

Can long passwords be secure and usable

Richard Shay; Saranga Komanduri; Adam L. Durity; Phillip (Seyoung) Huh; Michelle L. Mazurek; Sean M. Segreti; Blase Ur; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor

To encourage strong passwords, system administrators employ password-composition policies, such as a traditional policy requiring that passwords have at least 8 characters from 4 character classes and pass a dictionary check. Recent research has suggested, however, that policies requiring longer passwords with fewer additional requirements can be more usable and in some cases more secure than this traditional policy. To explore long passwords in more detail, we conducted an online experiment with 8,143 participants. Using a cracking algorithm modified for longer passwords, we evaluate eight policies across a variety of metrics for strength and usability. Among the longer policies, we discover new evidence for a security/usability tradeoff, with none being strictly better than another on both dimensions. However, several policies are both more usable and more secure that the traditional policy we tested. Our analyses additionally reveal common patterns and strings found in cracked passwords. We discuss how system administrators can use these results to improve password-composition policies.


human factors in computing systems | 2013

i read my Twitter the next morning and was astonished: a conversational perspective on Twitter regrets

Manya Sleeper; Justin Cranshaw; Patrick Gage Kelley; Blase Ur; Alessandro Acquisti; Lorrie Faith Cranor; Norman M. Sadeh

We present the results of an online survey of 1,221 Twitter users, comparing messages individuals regretted either saying during in-person conversations or posting on Twitter. Participants generally reported similar types of regrets in person and on Twitter. In particular, they often regretted messages that were critical of others. However, regretted messages that were cathartic/expressive or revealed too much information were reported at a higher rate for Twitter. Regretted messages on Twitter also reached broader audiences. In addition, we found that participants who posted on Twitter became aware of, and tried to repair, regret more slowly than those reporting in-person regrets. From this comparison of Twitter and in-person regrets, we provide preliminary ideas for tools to help Twitter users avoid and cope with regret.


ACM Transactions on Information and System Security | 2016

Designing Password Policies for Strength and Usability

Richard Shay; Saranga Komanduri; Adam L. Durity; Phillip (Seyoung) Huh; Michelle L. Mazurek; Sean M. Segreti; Blase Ur; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor

Password-composition policies are the result of service providers becoming increasingly concerned about the security of online accounts. These policies restrict the space of user-created passwords to preclude easily guessed passwords and thus make passwords more difficult for attackers to guess. However, many users struggle to create and recall their passwords under strict password-composition policies, for example, ones that require passwords to have at least eight characters with multiple character classes and a dictionary check. Recent research showed that a promising alternative was to focus policy requirements on password length instead of on complexity. In this work, we examine 15 password policies, many focusing on length requirements. In doing so, we contribute the first thorough examination of policies requiring longer passwords. We conducted two online studies with over 20,000 participants, and collected both usability and password-strength data. Our findings indicate that password strength and password usability are not necessarily inversely correlated: policies that lead to stronger passwords do not always reduce usability. We identify policies that are both more usable and more secure than commonly used policies that emphasize complexity rather than length requirements. We also provide practical recommendations for service providers who want their users to have strong yet usable passwords.


human factors in computing systems | 2016

Usability and Security of Text Passwords on Mobile Devices

William Melicher; Darya Kurilova; Sean M. Segreti; Pranshu Kalvani; Richard Shay; Blase Ur; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Michelle L. Mazurek

Recent research has improved our understanding of how to create strong, memorable text passwords. However, this research has generally been in the context of desktops and laptops, while users are increasingly creating and entering passwords on mobile devices. In this paper we study whether recent password guidance carries over to the mobile setting. We compare the strength and usability of passwords created and used on mobile devices with those created and used on desktops and laptops, while varying password policy requirements and input methods. We find that creating passwords on mobile devices takes significantly longer and is more error prone and frustrating. Passwords created on mobile devices are also weaker, but only against attackers who can make more than 10^13 guesses. We find that the effects of password policies differ between the desktop and mobile environments, and suggest ways to ease password entry for mobile users.


human factors in computing systems | 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior

Richard Shay; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Alain Forget; Saranga Komanduri; Michelle L. Mazurek; William Melicher; Sean M. Segreti; Blase Ur

Users often struggle to create passwords under strict requirements. To make this process easier, some providers present real-time feedback during password creation, indicating which requirements are not yet met. Other providers guide users through a multi-step password-creation process. Our 6,435-participant online study examines how feedback and guidance affect password security and usability. We find that real-time password-creation feedback can help users create strong passwords with fewer errors. We also find that although guiding participants through a three-step password-creation process can make creation easier, it may result in weaker passwords. Our results suggest that service providers should present password requirements with feedback to increase usability. However, the presentation of feedback and guidance must be carefully considered, since identical requirements can have different security and usability effects depending on presentation.


ACM Transactions on The Web | 2016

A Large-Scale Evaluation of U.S. Financial Institutions’ Standardized Privacy Notices

Lorrie Faith Cranor; Pedro Giovanni Leon; Blase Ur

Financial institutions in the United States are required by the Gramm-Leach-Bliley Act to provide annual privacy notices. In 2009, eight federal agencies jointly released a model privacy form for these disclosures. While the use of this model privacy form is not required, it has been widely adopted. We automatically evaluated 6,191 U.S. financial institutions’ privacy notices posted on the World Wide Web. We found large variance in stated practices, even among institutions of the same type. While thousands of financial institutions share personal information without providing the opportunity for consumers to opt out, some institutions’ practices are more privacy protective. Regression analyses show that large institutions and those headquartered in the northeastern region share consumers’ personal information at higher rates than all other institutions. Furthermore, our analysis helped us uncover institutions that do not let consumers limit data sharing when legally required to do so, as well as institutions making self-contradictory statements. We discuss implications for privacy in the financial industry, issues with the design and use of the model privacy form on the World Wide Web, and future directions for standardized privacy notice.


human factors in computing systems | 2014

Practical trigger-action programming in the smart home

Blase Ur; Elyse McManus; Melwyn Pak Yong Ho; Michael L. Littman

Collaboration


Dive into the Blase Ur's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Richard Shay

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Lujo Bauer

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Nicolas Christin

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Saranga Komanduri

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Sean M. Segreti

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manya Sleeper

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge