On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability

Q Yan, J Han, Y Li, H DENG - 2012 - ink.library.smu.edu.sg
The design of leakage-resilient password systems (LRPSes) in the absence of trusted
devices remains a challenging problem today despite two decades of intensive research in …

Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks

T Kwon, J Hong - Ieee transactions on information forensics and …, 2014 - ieeexplore.ieee.org
Devising a user authentication scheme based on personal identification numbers (PINs) that
is both secure and practically usable is a challenging problem. The greatest difficulty lies …

[PDF][PDF] Pitfalls of shoulder surfing studies

O Wiese, V Roth - NDSS workshop on usable security, 2015 - researchgate.net
We review empirical studies that evaluate the resilience of various PIN entry methods
against human shoulder surfers. Conducting such studies is challenging because …

Timing attacks on cognitive authentication schemes

M Čagalj, T Perković, M Bugarić - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Classical password/PIN-based authentication methods have proven to be vulnerable to a
broad range of observation attacks (such as key-logging, video-recording or shoulder …

SteganoPIN: Two-faced human–machine interface for practical enforcement of PIN entry security

T Kwon, S Na - IEEE Transactions on Human-Machine Systems, 2015 - ieeexplore.ieee.org
Users typically reuse the same personalized identification number (PIN) for multiple systems
and in numerous sessions. Direct PIN entries are highly susceptible to shoulder-surfing …

When eye-tracking meets cognitive modeling: applications to cyber security systems

H Yuan, S Li, P Rusconi, N Aljaffan - … Conference, HAS 2017, Held as Part …, 2017 - Springer
Human cognitive modeling techniques and related software tools have been widely used by
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …

Leakage-resilient password entry: challenges, design, and evaluation

Q Yan, J Han, Y Li, J Zhou, RH Deng - Computers & Security, 2015 - Elsevier
Password leakage is one of the most serious threats for password-based user
authentication. Although this problem has been extensively investigated over the last two …

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

HJ Asghar, S Li, R Steinfeld, J Pierpzyk - Cryptology ePrint Archive, 2012 - eprint.iacr.org
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user
authentication protocols against passive observers, and proposed a generic counting based …

Color wheel pin: Usable and resilient ATM authentication

M Guerar, M Benmohammed… - Journal of High Speed …, 2016 - content.iospress.com
We are witnessing a growing demand for ATM authentication solutions that overcome the
limitations of the de facto standard mechanism based on magnetic card and numeric PIN …

Review of Cognitive Modeling Software Tools

H Yuan, S Li, P Rusconi, H Yuan, S Li… - Cognitive Modeling for …, 2020 - Springer
A large number of cognitive models have been developed and widely used in the HCI
domain. GOMS (Gray et al (1993) Hum Comput Interact 8 (3): 237–309; John and Kieras …