[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums

E Tseng, R Bellini, N McDonald, M Danos… - 29th USENIX security …, 2020 - usenix.org
Abusers increasingly use spyware apps, account compromise, and social engineering to
surveil their intimate partners, causing substantial harms that can culminate in violence. This …

The android platform security model

R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …

Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research

F Mathis, J O'Hagan, M Khamis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …

Draw it as shown: Behavioral pattern lock for mobile user authentication

Y Ku, LH Park, S Shin, T Kwon - IEEE Access, 2019 - ieeexplore.ieee.org
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …

Integrating handcrafted features with deep representations for smartphone authentication

Y Song, Z Cai - Proceedings of the ACM on Interactive, Mobile …, 2022 - dl.acm.org
Recent research demonstrates the potential of touch dynamics as a usable and privacy-
preserving scheme for smartphone authentication. Most existing approaches rely on …

Bu-Dash: a universal and dynamic graphical password scheme (extended version)

P Andriotis, M Kirby, A Takasu - International Journal of Information …, 2023 - Springer
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …

A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication

L Zhou, K Wang, J Lai, D Zhang - IEEE Transactions on Human …, 2023 - ieeexplore.ieee.org
The pervasive use of mobile devices exposes users to an elevated risk of shoulder-surfing
attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication …

Presspin: Enabling secure pin authentication on mobile devices via structure-borne sounds

M Zhou, Q Wang, X Lin, Y Zhao, P Jiang… - … on Dependable and …, 2022 - ieeexplore.ieee.org
PIN authentication is widely used on mobile devices due to its usability and simplicity.
However, it is known to be susceptible to shoulder surfing attacks, where an adversary spies …

Securing PIN‐based authentication in smartwatches with just two gestures

M Guerar, M Migliardi, F Palmieri… - Concurrency and …, 2020 - Wiley Online Library
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to
develop sophisticated applications that make daily life easier and more convenient for …