[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020‏ - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

This pin can be easily guessed: Analyzing the security of smartphone unlock pins

P Markert, DV Bailey, M Golla… - … IEEE Symposium on …, 2020‏ - ieeexplore.ieee.org
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …

Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021‏ - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …

{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage

P Cronin, X Gao, C Yang, H Wang - 30th USENIX Security Symposium …, 2021‏ - usenix.org
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …

Stay home! Conducting remote usability evaluations of novel real-world authentication systems using virtual reality

F Mathis, J O'hagan, K Vaniea, M Khamis - Proceedings of the 2022 …, 2022‏ - dl.acm.org
Evaluating interactive systems often requires researchers to invite user study participants to
the lab. However, corresponding evaluations often lack realism and participants are usually …

On the security of smartphone unlock pins

P Markert, DV Bailey, M Golla, M Dürmuth… - ACM Transactions on …, 2021‏ - dl.acm.org
In this article, we provide the first comprehensive study of user-chosen four-and six-digit
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …

Draw it as shown: Behavioral pattern lock for mobile user authentication

Y Ku, LH Park, S Shin, T Kwon - IEEE Access, 2019‏ - ieeexplore.ieee.org
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …

PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices

M Bâce, A Saad, M Khamis… - … on Privacy Enhancing …, 2022‏ - petsymposium.org
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …

Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research

F Mathis, J O'Hagan, M Khamis… - 2022 IEEE conference …, 2022‏ - ieeexplore.ieee.org
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …

[HTML][HTML] Shoulder surfing: From an experimental study to a comparative framework

L Bošnjak, B Brumen - International Journal of Human-Computer Studies, 2019‏ - Elsevier
Shoulder surfing is an attack vector widely recognized as a real threat-enough to warrant
researchers dedicating a considerable effort toward designing novel authentication methods …