The role of eye gaze in security and privacy applications: Survey and future HCI research directions

C Katsini, Y Abdrabou, GE Raptis, M Khamis… - Proceedings of the 2020 …, 2020 - dl.acm.org
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …

Reducing shoulder-surfing by using gaze-based password entry

M Kumar, T Garfinkel, D Boneh… - Proceedings of the 3rd …, 2007 - dl.acm.org
Shoulder-surfing--using direct observation techniques, such as looking over someone's
shoulder, to get passwords, PINs and other sensitive personal information--is a problem that …

Gaze-based interaction: A 30 year retrospective

AT Duchowski - Computers & Graphics, 2018 - Elsevier
Gaze-based interaction is reviewed, categorized within a taxonomy that splits interaction into
four forms, namely diagnostic (off-line measurement), active (selection, look to shoot) …

Increasing the security of gaze-based cued-recall graphical passwords using saliency masks

A Bulling, F Alt, A Schmidt - Proceedings of the SIGCHI conference on …, 2012 - dl.acm.org
With computers being used ever more ubiquitously in situations where privacy is important,
secure user authentication is a central requirement. Gaze-based graphical passwords are a …

A systematic review of graphical password methods resistant to shoulder-surfing attacks

F Binbeshr, KC Siong, L Yee, M Imam… - International Journal of …, 2025 - Springer
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …

TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems

T Kwon, S Na - computers & security, 2014 - Elsevier
A pattern lock system is a widely used graphical password mechanism in today's mobile
computing environment. To unlock a smartphone, a user draws a memorized graphical …

Gazepair: Efficient pairing of augmented reality devices using gaze tracking

M Corbett, J Shang, B Ji - IEEE Transactions on Mobile …, 2023 - ieeexplore.ieee.org
As Augmented Reality (AR) devices become more prevalent and commercially viable, the
need for quick, efficient, and secure schemes for pairing these devices has become more …

Real-time continuous iris recognition for authentication using an eye tracker

K Mock, B Hoanca, J Weaver, M Milton - … of the 2012 ACM conference on …, 2012 - dl.acm.org
The majority of today's authentication systems, including password and fingerprint scanners,
are based on one-time, static authentication methods. A continuous, real-time authentication …

Gaze-based password authentication through automatic clustering of gaze points

J Weaver, K Mock, B Hoanca - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
Researchers have proposed systems in which users utilize an eye tracker to enter
passwords by merely looking at the proper symbols on the computer monitor in the …

A gaze gesture-based user authentication system to counter shoulder-surfing attacks

V Rajanna, S Polsley, P Taele… - Proceedings of the 2017 …, 2017 - dl.acm.org
Shoulder-surfing is the act of spying on an authorized user of a computer system with the
malicious intent of gaining unauthorized access. Current solutions to address shoulder …