Continuous user authentication on smartphone via behavioral biometrics: a survey

PK Rayani, S Changder - Multimedia Tools and Applications, 2023 - Springer
The use of ubiquitous devices is increasing worldwide due to signs of progress in
sophisticated hardware technology with cutting-edge features. These features offer most …

[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

Patternlistener: Cracking android pattern lock using acoustic signals

M Zhou, Q Wang, J Yang, Q Li, F **ao, Z Wang… - Proceedings of the …, 2018 - dl.acm.org
Pattern lock has been widely used for authentication to protect user privacy on mobile
devices (eg, smartphones and tablets). Several attacks have been constructed to crack the …

SwipePass: Acoustic-based second-factor user authentication for smartphones

Y Chen, T Ni, W Xu, T Gu - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …

Understanding human-chosen pins: characteristics, distribution and security

D Wang, Q Gu, X Huang, P Wang - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
Personal Identification Numbers (PINs) are ubiquitously used in embedded computing
systems where user input interfaces are constrained. Yet, little attention has been paid to this …

Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock

AJ Aviv, D Budzitowski, R Kuber - … of the 31st Annual Computer Security …, 2015 - dl.acm.org
Android's graphical authentication mechanism requires users to unlock their devices by"
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …

Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones

D Shi, D Tao, J Wang, M Yao, Z Wang, H Chen… - Proceedings of the …, 2021 - dl.acm.org
Pattern lock has been widely used in smartphones as a simple and effective authentication
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …

A video-based attack for android pattern lock

G Ye, Z Tang, D Fang, X Chen, W Wolff… - ACM Transactions on …, 2018 - dl.acm.org
Pattern lock is widely used for identification and authentication on Android devices. This
article presents a novel video-based side channel attack that can reconstruct Android …

Optiwords: A new password policy for creating memorable and strong passwords

Y Guo, Z Zhang, Y Guo - Computers & Security, 2019 - Elsevier
User-generated textual passwords suffer from the conflict between security and usability.
System administrators usually adopt password composition policies to help users choose …