get_col("DESC $table_name", 0) as $column ) { if ($debug) echo("checking $column == $column_name
"); if ($column == $column_name) { return true; } } //didn't find it try to create it. $q = $wpdb->query($create_ddl); // we cannot directly tell that whether this succeeded! foreach ($wpdb->get_col("DESC $table_name", 0) as $column ) { if ($column == $column_name) { return true; } } return false; } } function btc_altertable() { global $tablecomments; $sql = "ALTER TABLE $tablecomments ADD COLUMN comment_reply_ID INT NOT NULL DEFAULT 0;"; maybe_add_column($tablecomments, 'comment_reply_ID', $sql); } function btc_alter_comment($new_id) { global $tablecomments, $wpdb; $sql = "UPDATE $tablecomments SET comment_reply_ID=".$_POST['comment_reply_ID']." WHERE comment_ID = $new_id;"; $wpdb->query($sql); } function briansnestedcomments() { global $font_gets_smaller; if (!($withcomments) && ($single)) return; // You can safely delete the single line below if your threaded comments are up and running btc_altertable(); ?> Usable Security » Blog Archive » Look into my Eyes! Can you guess my Password?

Look into my Eyes! Can you guess my Password?

July 16, 2009 by Richard Conlan
Alexander De Luca, Martin Denzel and Heinrich Hussmann

Many password entry systems suffer from weakness against attacks where the attacker can view either the keyboard or screen.  The proposal is to use eye movements for password entry, building off the findings of EyePassword, Eye Gestures, and PassShapes.  The researchers implemented EyePassShapes, in which the user traces a shape by moving their eye between a series of points.  Their prototype used a standard eye tracking system (called ERICA).

In an initial evaluation the researchers included ten participants and examined whether it was easier to trace out EyePassShapes on a dotted background versus a gridded background.  What differences they found were evaluated to be insignificant, so they went with dotted backgrounds.  They then conducted the usability study proper with twenty-four participants using PINs, PassShapes, EyePassShapes, and EyePINs.  The usability was based on the user reports which indicated that PINs were the most usable, followed by PassShapes, with EyePassShapes and EyePINs similarly usable.

They then conducted a security evaluation by allowing an attacker three attempts at breaking each entry attempt.  The attack was a security expect but did not participate in the user study, but was able to view videos of each subject filmed from the front and the side.  The PIN and PassShapes were broken 100% of the time, with EyePassShapes broken 54.5% of the time and EyePIN 41.7% of the time.  It was found that when the EyePassShape was traced as a series of strokes instead of one continues stroke, it was harder to crack.

Finally, they conducted a memorability evaluation.  It was found that EyePassShapes had similar memorability to normal PassShapes.  They only evaluated the memorability of a single shape, and not what would happen if users had multiple shapes to remember.