Understanding shoulder surfing in the wild: Stories from users and observers
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …
attacks. However, there is little work about shoulder surfing situations in the real world. We …
Adversary models for mobile device authentication
R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
Remote VR studies: A framework for running virtual reality studies remotely via participant-owned HMDs
We investigate opportunities and challenges of running virtual reality (VR) studies remotely.
Today, many consumers own head-mounted displays (HMDs), allowing them to participate …
Today, many consumers own head-mounted displays (HMDs), allowing them to participate …
Stay cool! understanding thermal attacks on mobile-based user authentication
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …
Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …
authentication, where people are required to draw graphical passwords on background …
Influences of human cognition and visual behavior on password strength during picture password composition
Visual attention, search, processing and comprehension are important cognitive tasks
during a graphical password composition activity. Aiming to shed light on whether individual …
during a graphical password composition activity. Aiming to shed light on whether individual …
A novel dictionary generation methodology for contextual-based password cracking
It has been more than 50 years since the concept of passwords was introduced and adopted
in our society as a digital authentication method. Despite alternative authentication methods …
in our society as a digital authentication method. Despite alternative authentication methods …
Free-form gesture authentication in the wild
Free-form gesture passwords have been introduced as an alternative mobile authentication
method. Text passwords are not very suitable for mobile interaction, and methods such as …
method. Text passwords are not very suitable for mobile interaction, and methods such as …
PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …
presence of a bystander using the phone's front-facing camera. However, a person's face in …
Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …