Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Saranga Komanduri is active.

Publication


Featured researches published by Saranga Komanduri.


human factors in computing systems | 2011

Of passwords and people: measuring the effect of password-composition policies

Saranga Komanduri; Richard Shay; Patrick Gage Kelley; Michelle L. Mazurek; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Serge Egelman

Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to guess, system administrators adopt password-composition policies (e.g., requiring passwords to contain symbols and numbers). Unfortunately, little is known about the relationship between password-composition policies and the strength of the resulting passwords, or about the behavior of users (e.g., writing down passwords) in response to different policies. We present a large-scale study that investigates password strength, user behavior, and user sentiment across four password-composition policies. We characterize the predictability of passwords by calculating their entropy, and find that a number of commonly held beliefs about password composition and strength are inaccurate. We correlate our results with user behavior and sentiment to produce several recommendations for password-composition policies that result in strong passwords without unduly burdening users.


computer and communications security | 2013

Measuring password guessability for an entire university

Michelle L. Mazurek; Saranga Komanduri; Timothy Vidas; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Patrick Gage Kelley; Richard Shay; Blase Ur

Despite considerable research on passwords, empirical studies of password strength have been limited by lack of access to plaintext passwords, small data sets, and password sets specifically collected for a research study or from low-value accounts. Properties of passwords used for high-value accounts thus remain poorly understood. We fill this gap by studying the single-sign-on passwords used by over 25,000 faculty, staff, and students at a research university with a complex password policy. Key aspects of our contributions rest on our (indirect) access to plaintext passwords. We describe our data collection methodology, particularly the many precautions we took to minimize risks to users. We then analyze how guessable the collected passwords would be during an offline attack by subjecting them to a state-of-the-art password cracking algorithm. We discover significant correlations between a number of demographic and behavioral factors and password strength. For example, we find that users associated with the computer science school make passwords more than 1.5 times as strong as those of users associated with the business school. while users associated with computer science make strong ones. In addition, we find that stronger passwords are correlated with a higher rate of errors entering them. We also compare the guessability and other characteristics of the passwords we analyzed to sets previously collected in controlled experiments or leaked from low-value accounts. We find more consistent similarities between the university passwords and passwords collected for research studies under similar composition policies than we do between the university passwords and subsets of passwords leaked from low-value accounts that happen to comply with the same policies.


symposium on usable privacy and security | 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases

Richard Shay; Patrick Gage Kelley; Saranga Komanduri; Michelle L. Mazurek; Blase Ur; Timothy Vidas; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor

Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be hard to remember. Passphrases, space-delimited sets of natural language words, have been suggested as both secure and usable for decades. In a 1,476-participant online study, we explored the usability of 3- and 4-word system-assigned passphrases in comparison to system-assigned passwords composed of 5 to 6 random characters, and 8-character system-assigned pronounceable passwords. Contrary to expectations, system-assigned passphrases performed similarly to system-assigned passwords of similar entropy across the usability metrics we examined. Passphrases and passwords were forgotten at similar rates, led to similar levels of user difficulty and annoyance, and were both written down by a majority of participants. However, passphrases took significantly longer for participants to enter, and appear to require error-correction to counteract entry mistakes. Passphrase usability did not seem to increase when we shrunk the dictionary from which words were chosen, reduced the number of words in a passphrase, or allowed users to change the order of words.


human factors in computing systems | 2014

Can long passwords be secure and usable

Richard Shay; Saranga Komanduri; Adam L. Durity; Phillip (Seyoung) Huh; Michelle L. Mazurek; Sean M. Segreti; Blase Ur; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor

To encourage strong passwords, system administrators employ password-composition policies, such as a traditional policy requiring that passwords have at least 8 characters from 4 character classes and pass a dictionary check. Recent research has suggested, however, that policies requiring longer passwords with fewer additional requirements can be more usable and in some cases more secure than this traditional policy. To explore long passwords in more detail, we conducted an online experiment with 8,143 participants. Using a cracking algorithm modified for longer passwords, we evaluate eight policies across a variety of metrics for strength and usability. Among the longer policies, we discover new evidence for a security/usability tradeoff, with none being strictly better than another on both dimensions. However, several policies are both more usable and more secure that the traditional policy we tested. Our analyses additionally reveal common patterns and strings found in cracked passwords. We discuss how system administrators can use these results to improve password-composition policies.


ACM Transactions on Information and System Security | 2016

Designing Password Policies for Strength and Usability

Richard Shay; Saranga Komanduri; Adam L. Durity; Phillip (Seyoung) Huh; Michelle L. Mazurek; Sean M. Segreti; Blase Ur; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor

Password-composition policies are the result of service providers becoming increasingly concerned about the security of online accounts. These policies restrict the space of user-created passwords to preclude easily guessed passwords and thus make passwords more difficult for attackers to guess. However, many users struggle to create and recall their passwords under strict password-composition policies, for example, ones that require passwords to have at least eight characters with multiple character classes and a dictionary check. Recent research showed that a promising alternative was to focus policy requirements on password length instead of on complexity. In this work, we examine 15 password policies, many focusing on length requirements. In doing so, we contribute the first thorough examination of policies requiring longer passwords. We conducted two online studies with over 20,000 participants, and collected both usability and password-strength data. Our findings indicate that password strength and password usability are not necessarily inversely correlated: policies that lead to stronger passwords do not always reduce usability. We identify policies that are both more usable and more secure than commonly used policies that emphasize complexity rather than length requirements. We also provide practical recommendations for service providers who want their users to have strong yet usable passwords.


network and distributed system security symposium | 2015

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords

Jeremiah Blocki; Saranga Komanduri; Lorrie Faith Cranor; Anupam Datta

We report on a user study that provides evidence that spaced repetition and a specific mnemonic technique enable users to successfully recall multiple strong passwords over time. Remote research participants were asked to memorize 4 Person-Action-Object (PAO) stories where they chose a famous person from a drop-down list and were given machine-generated random action-object pairs. Users were also shown a photo of a scene and asked to imagine the PAO story taking place in the scene (e.g., Bill Gates---swallowing---bike on a beach). Subsequently, they were asked to recall the action-object pairs when prompted with the associated scene-person pairs following a spaced repetition schedule over a period of 127+ days. While we evaluated several spaced repetition schedules, the best results were obtained when users initially returned after 12 hours and then in


human factors in computing systems | 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior

Richard Shay; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Alain Forget; Saranga Komanduri; Michelle L. Mazurek; William Melicher; Sean M. Segreti; Blase Ur

1.5\times


ACM Computing Surveys | 2017

Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online

Alessandro Acquisti; Idris Adjerid; Rebecca Balebako; Laura Brandimarte; Lorrie Faith Cranor; Saranga Komanduri; Pedro Giovanni Leon; Norman M. Sadeh; Florian Schaub; Manya Sleeper; Yang Wang; Shomir Wilson

increasing intervals: 77% of the participants successfully recalled all 4 stories in 10 tests over a period of 158 days. Much of the forgetting happened in the first test period (12 hours): 89% of participants who remembered their stories during the first test period successfully remembered them in every subsequent round. These findings, coupled with recent results on naturally rehearsing password schemes, suggest that 4 PAO stories could be used to create usable and strong passwords for 14 sensitive accounts following this spaced repetition schedule, possibly with a few extra upfront rehearsals. In addition, we find that there is an interference effect across multiple PAO stories: the recall rate of 100% (resp. 90%) for participants who were asked to memorize 1 PAO story (resp. 2 PAO stories) is significantly better than the recall rate for participants who were asked to memorize 4 PAO stories. These findings yield concrete advice for improving constructions of password management schemes and future user studies.


symposium and bootcamp on science of security | 2014

Building the security behavior observatory: an infrastructure for long-term monitoring of client machines

Alain Forget; Saranga Komanduri; Alessandro Acquisti; Nicolas Christin; Lorrie Faith Cranor; Rahul Telang

Users often struggle to create passwords under strict requirements. To make this process easier, some providers present real-time feedback during password creation, indicating which requirements are not yet met. Other providers guide users through a multi-step password-creation process. Our 6,435-participant online study examines how feedback and guidance affect password security and usability. We find that real-time password-creation feedback can help users create strong passwords with fewer errors. We also find that although guiding participants through a three-step password-creation process can make creation easier, it may result in weaker passwords. Our results suggest that service providers should present password requirements with feedback to increase usability. However, the presentation of feedback and guidance must be carefully considered, since identical requirements can have different security and usability effects depending on presentation.


financial cryptography | 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs

Patrick Gage Kelley; Saranga Komanduri; Michelle L. Mazurek; Richard Shay; Timothy Vidas; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor

Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security tradeoffs, the decision-making hurdles affecting those choices, and ways to mitigate such hurdles. This article provides a multi-disciplinary assessment of the literature pertaining to privacy and security decision making. It focuses on research on assisting individuals’ privacy and security choices with soft paternalistic interventions that nudge users toward more beneficial choices. The article discusses potential benefits of those interventions, highlights their shortcomings, and identifies key ethical, design, and research challenges.

Collaboration


Dive into the Saranga Komanduri's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nicolas Christin

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Richard Shay

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Lujo Bauer

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Blase Ur

University of Chicago

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manya Sleeper

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Timothy Vidas

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Sean M. Segreti

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge