A systematic deconstruction of human-centric privacy & security threats on mobile phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

An investigation of shoulder surfing attacks on touch-based unlock events

S Schneegass, A Saad, R Heger… - Proceedings of the …, 2022 - dl.acm.org
This paper contributes to our understanding of user-centered attacks on smartphones. In
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …

Understanding shoulder surfer behavior and attack patterns using virtual reality

Y Abdrabou, SR Rivu, T Ammar, J Liebers… - Proceedings of the …, 2022 - dl.acm.org
In this work, we explore attacker behavior during shoulder surfing. As such behavior is often
opportunistic and difficult to observe in real world settings, we leverage the capabilities of …

SigA: rPPG-based authentication for virtual reality head-mounted display

L Li, C Chen, L Pan, LY Zhang, J Zhang… - Proceedings of the 26th …, 2023 - dl.acm.org
Consumer-grade virtual reality head-mounted displays (VR-HMD) are becoming
increasingly popular. Despite VR's convenience and booming applications, VR-based …

Don't Peek at My Chart: Privacy‐preserving Visualization for Mobile Devices

S Zhang, D Ma, Y Wang - Computer Graphics Forum, 2023 - Wiley Online Library
Data visualizations have been widely used on mobile devices like smartphones for various
tasks (eg, visualizing personal health and financial data), making it convenient for people to …

Introduction to Authentication using Behavioral Biometrics

J Liebers, U Gruenefeld, D Buschek, F Alt… - Extended Abstracts of …, 2023 - dl.acm.org
The trend of ubiquitous computing goes in parallel with ubiquitous authentication, as users
must confirm their identity several times a day on their devices. Passwords are increasingly …

'can you set it up on your own?'–investigating users' ability to participate in remote-based virtual reality studies

R Rivu, H Bayerl, P Knierim, F Alt - Proceedings of the 21st International …, 2022 - dl.acm.org
The availability of consumer-grade virtual reality (VR) devices allows user studies to be
conducted remotely, that is in users' homes. In this way, diverse populations can be reached …

" What you think is private is no longer"--Investigating the Aftermath of Shoulder Surfing on Smartphones in Everyday Life through the Eyes of the Victims

H Farzand, S Macdonald, K Marky… - arxiv preprint arxiv …, 2024 - arxiv.org
Shoulder surfing has been studied extensively, however, it remains unexplored whether and
how it impacts users. Understanding this is important as it determines whether shoulder …

An Intersection Attack on the CirclePIN Smartwatch Authentication Mechanism

D Chefrour, Y Sedira, S Chabbi - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
We present a thorough security analysis of a recent smartwatch authentication mechanism
called CirclePIN, which was considered resilient to several attacks, including shoulder …

Exploring Vulnerabilities in Remote VR User Studies

V Paneva, F Alt - arxiv preprint arxiv:2404.17588, 2024 - arxiv.org
This position paper explores the possibilities and challenges of using Virtual Reality (VR) in
remote user studies. Highlighting the immersive nature of VR, the paper identifies key …