An investigation of shoulder surfing attacks on touch-based unlock events

S Schneegass, A Saad, R Heger… - Proceedings of the …, 2022 - dl.acm.org
This paper contributes to our understanding of user-centered attacks on smartphones. In
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …

SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display

L Li, C Chen, L Pan, LY Zhang, J Zhang… - Proceedings of the 26th …, 2023 - dl.acm.org
Consumer-grade virtual reality head-mounted displays (VR-HMD) are becoming
increasingly popular. Despite VR's convenience and booming applications, VR-based …

A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

An Intersection Attack on the CirclePIN Smartwatch Authentication Mechanism

D Chefrour, Y Sedira, S Chabbi - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
We present a thorough security analysis of a recent smartwatch authentication mechanism
called CirclePIN, which was considered resilient to several attacks, including shoulder …

Don't Peek at My Chart: Privacy‐preserving Visualization for Mobile Devices

S Zhang, D Ma, Y Wang - Computer Graphics Forum, 2023 - Wiley Online Library
Data visualizations have been widely used on mobile devices like smartphones for various
tasks (eg, visualizing personal health and financial data), making it convenient for people to …

" What you think is private is no longer"--Investigating the Aftermath of Shoulder Surfing on Smartphones in Everyday Life through the Eyes of the Victims

H Farzand, S Macdonald, K Marky… - arxiv preprint arxiv …, 2024 - arxiv.org
Shoulder surfing has been studied extensively, however, it remains unexplored whether and
how it impacts users. Understanding this is important as it determines whether shoulder …

Introduction to Authentication using Behavioral Biometrics

J Liebers, U Gruenefeld, D Buschek, F Alt… - Extended Abstracts of …, 2023 - dl.acm.org
The trend of ubiquitous computing goes in parallel with ubiquitous authentication, as users
must confirm their identity several times a day on their devices. Passwords are increasingly …

Exploring Vulnerabilities in Remote VR User Studies

V Paneva, F Alt - arxiv preprint arxiv:2404.17588, 2024 - arxiv.org
This position paper explores the possibilities and challenges of using Virtual Reality (VR) in
remote user studies. Highlighting the immersive nature of VR, the paper identifies key …

Pedestrian Interaction with a Snow Clearing Robot

A Colley, M Tiitto, B Pfleging, J Häkkilä - IFIP Conference on Human …, 2023 - Springer
In this paper, we investigate pedestrian interaction with a large autonomous robot that clears
snow from the sidewalk. Through a virtual reality (VR) based user study, simulating different …

Two-way Robust Authentication Method to Prevent Shoulder Surfing Attack

A Goyal, P Matta - 2023 Second International Conference on …, 2023 - ieeexplore.ieee.org
Shoulder surfing is a sort of attack in which the attacker observes the victim's login
information and attempts to obtain unauthorized access to the system. This may be …