[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception

M Harbach, E Von Zezschwitz, A Fichtner… - 10th symposium on …, 2014 - usenix.org
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …

Understanding shoulder surfing in the wild: Stories from users and observers

M Eiband, M Khamis, E Von Zezschwitz… - Proceedings of the …, 2017 - dl.acm.org
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Are you ready to lock?

S Egelman, S Jain, RS Portnoff, K Liao… - Proceedings of the …, 2014 - dl.acm.org
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

The anatomy of smartphone unlocking: A field study of android lock screens

M Harbach, A De Luca, S Egelman - … of the 2016 chi conference on …, 2016 - dl.acm.org
To prevent unauthorized parties from accessing data stored on their smartphones, users
have the option of enabling a" lock screen" that requires a secret code (eg, PIN, drawing a …

Usability and security of text passwords on mobile devices

W Melicher, D Kurilova, SM Segreti, P Kalvani… - Proceedings of the …, 2016 - dl.acm.org
Recent research has improved our understanding of how to create strong, memorable text
passwords. However, this research has generally been in the context of desktops and …

A shoulder surfing resistant graphical authentication system

HM Sun, ST Chen, JH Yeh… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Authentication based on passwords is used largely in applications for computer security and
privacy. However, human actions such as choosing bad passwords and inputting passwords …

Stay cool! understanding thermal attacks on mobile-based user authentication

Y Abdelrahman, M Khamis, S Schneegass… - Proceedings of the 2017 …, 2017 - dl.acm.org
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …