Understanding shoulder surfing in the wild: Stories from users and observers

M Eiband, M Khamis, E Von Zezschwitz… - Proceedings of the …, 2017 - dl.acm.org
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Remote VR studies: A framework for running virtual reality studies remotely via participant-owned HMDs

R Radiah, V Mäkelä, S Prange, SD Rodriguez… - ACM Transactions on …, 2021 - dl.acm.org
We investigate opportunities and challenges of running virtual reality (VR) studies remotely.
Today, many consumers own head-mounted displays (HMDs), allowing them to participate …

Stay cool! understanding thermal attacks on mobile-based user authentication

Y Abdelrahman, M Khamis, S Schneegass… - Proceedings of the 2017 …, 2017 - dl.acm.org
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …

Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices

GE Raptis, C Katsini, AJL Cen… - Proceedings of the …, 2021 - dl.acm.org
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …

Influences of human cognition and visual behavior on password strength during picture password composition

C Katsini, C Fidas, GE Raptis, M Belk… - Proceedings of the …, 2018 - dl.acm.org
Visual attention, search, processing and comprehension are important cognitive tasks
during a graphical password composition activity. Aiming to shed light on whether individual …

A novel dictionary generation methodology for contextual-based password cracking

A Kanta, I Coisel, M Scanlon - IEEE Access, 2022 - ieeexplore.ieee.org
It has been more than 50 years since the concept of passwords was introduced and adopted
in our society as a digital authentication method. Despite alternative authentication methods …

Free-form gesture authentication in the wild

Y Yang, GD Clark, J Lindqvist, A Oulasvirta - Proceedings of the 2016 …, 2016 - dl.acm.org
Free-form gesture passwords have been introduced as an alternative mobile authentication
method. Text passwords are not very suitable for mobile interaction, and methods such as …

PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices

M Bâce, A Saad, M Khamis… - … on Privacy Enhancing …, 2022 - petsymposium.org
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …

Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations

A Constantinides, M Belk, C Fidas, R Beumers… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …