Continuous user authentication on smartphone via behavioral biometrics: a survey
PK Rayani, S Changder - Multimedia Tools and Applications, 2023 - Springer
The use of ubiquitous devices is increasing worldwide due to signs of progress in
sophisticated hardware technology with cutting-edge features. These features offer most …
sophisticated hardware technology with cutting-edge features. These features offer most …
[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
Patternlistener: Cracking android pattern lock using acoustic signals
Pattern lock has been widely used for authentication to protect user privacy on mobile
devices (eg, smartphones and tablets). Several attacks have been constructed to crack the …
devices (eg, smartphones and tablets). Several attacks have been constructed to crack the …
SwipePass: Acoustic-based second-factor user authentication for smartphones
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …
However, this scheme relies essentially on passwords, making it vulnerable to various side …
Understanding human-chosen pins: characteristics, distribution and security
Personal Identification Numbers (PINs) are ubiquitously used in embedded computing
systems where user input interfaces are constrained. Yet, little attention has been paid to this …
systems where user input interfaces are constrained. Yet, little attention has been paid to this …
Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock
Android's graphical authentication mechanism requires users to unlock their devices by"
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …
Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones
Pattern lock has been widely used in smartphones as a simple and effective authentication
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …
A video-based attack for android pattern lock
Pattern lock is widely used for identification and authentication on Android devices. This
article presents a novel video-based side channel attack that can reconstruct Android …
article presents a novel video-based side channel attack that can reconstruct Android …
Optiwords: A new password policy for creating memorable and strong passwords
Y Guo, Z Zhang, Y Guo - Computers & Security, 2019 - Elsevier
User-generated textual passwords suffer from the conflict between security and usability.
System administrators usually adopt password composition policies to help users choose …
System administrators usually adopt password composition policies to help users choose …