AJ Aviv, JT Davin, F Wolf, R Kuber - Proceedings of the 33rd Annual …, 2017 - dl.acm.org
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the …
A Saad, M Chukwu, S Schneegass - Proceedings of the 17th …, 2018 - dl.acm.org
Since mobile interaction takes place in almost every context, shoulder surfing attacks are becoming more and more a threat to user's privacy. While several approaches exist to …
Research has brought forth a variety of authentication systems to mitigate observation attacks. However, there is little work about shoulder surfing situations in the real world. We …
In this paper, we present XSide, an authentication mechanism that uses the front and the back of smartphones to enter stroke-based passwords. Users can switch sides during input …
JT Davin, AJ Aviv, F Wolf, R Kuber - Proceedings of the 2017 CHI …, 2017 - dl.acm.org
In this paper, we describe a novel approach to measure the susceptibility of smartphone unlock authentication to shoulder surfing attacks. In our methodology, participants play the …
Although mobile devices provide access to a plethora of sensitive data, most users still only protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …
Shoulder-surfing studies in the context of mobile user authentication have focused on evaluating the attackers' performance, yet have paid much less attention to their perception …
O Wiese, V Roth - Proceedings of the 18th International Conference on …, 2016 - dl.acm.org
Friends, family and colleagues at work may repeatedly observe how their peers unlock their smartphones. These" insiders" may combine multiple partial observations to form a …
Abstract PIN (Personal Identification Number) code entry is a widely used authentication method used on smartphones, ATMs, etc. However, it is typically subject to shoulder surfing …