Design of a Tactile Aid for Non-Observable Mobile Authentication to Address Observation Attacks

F Wolf, R Kuber, AJ Aviv - 2017 - mdsoar.org
Shoulder surfing remains a liability to the security of private data on mobile phones, even as
secondary biometric authentication becomes more commonplace. Mobile users in public or …

Towards baselines for shoulder surfing on mobile authentication

AJ Aviv, JT Davin, F Wolf, R Kuber - Proceedings of the 33rd Annual …, 2017 - dl.acm.org
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime
target for credential leaking via shoulder surfing, a form of an observation attack. While the …

Communicating shoulder surfing attacks to users

A Saad, M Chukwu, S Schneegass - Proceedings of the 17th …, 2018 - dl.acm.org
Since mobile interaction takes place in almost every context, shoulder surfing attacks are
becoming more and more a threat to user's privacy. While several approaches exist to …

Understanding shoulder surfing in the wild: Stories from users and observers

M Eiband, M Khamis, E Von Zezschwitz… - Proceedings of the …, 2017 - dl.acm.org
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

A De Luca, M Harbach, E von Zezschwitz… - Proceedings of the …, 2014 - dl.acm.org
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …

Baseline measurements of shoulder surfing analysis and comparability for smartphone unlock authentication

JT Davin, AJ Aviv, F Wolf, R Kuber - Proceedings of the 2017 CHI …, 2017 - dl.acm.org
In this paper, we describe a novel approach to measure the susceptibility of smartphone
unlock authentication to shoulder surfing attacks. In our methodology, participants play the …

GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication

M Khamis, M Hassib, E Zezschwitz, A Bulling… - Proceedings of the 19th …, 2017 - dl.acm.org
Although mobile devices provide access to a plethora of sensitive data, most users still only
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …

Shoulder Surfing on Mobile Authentication: Perception vis-a-vis Performance from the Attacker's Perspective

K Wang, L Zhou, D Zhang, J Lai - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Shoulder-surfing studies in the context of mobile user authentication have focused on
evaluating the attackers' performance, yet have paid much less attention to their perception …

See you next time: A model for modern shoulder surfers

O Wiese, V Roth - Proceedings of the 18th International Conference on …, 2016 - dl.acm.org
Friends, family and colleagues at work may repeatedly observe how their peers unlock their
smartphones. These" insiders" may combine multiple partial observations to form a …

VibroAuth: authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks

M Varma, S Watson, L Chan, R Peiris - International Conference on …, 2022 - Springer
Abstract PIN (Personal Identification Number) code entry is a widely used authentication
method used on smartphones, ATMs, etc. However, it is typically subject to shoulder surfing …