An investigation of shoulder surfing attacks on touch-based unlock events
This paper contributes to our understanding of user-centered attacks on smartphones. In
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display
Consumer-grade virtual reality head-mounted displays (VR-HMD) are becoming
increasingly popular. Despite VR's convenience and booming applications, VR-based …
increasingly popular. Despite VR's convenience and booming applications, VR-based …
A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …
resources needed to carry out such attacks are becoming increasingly available and, hence …
An Intersection Attack on the CirclePIN Smartwatch Authentication Mechanism
We present a thorough security analysis of a recent smartwatch authentication mechanism
called CirclePIN, which was considered resilient to several attacks, including shoulder …
called CirclePIN, which was considered resilient to several attacks, including shoulder …
Don't Peek at My Chart: Privacy‐preserving Visualization for Mobile Devices
Data visualizations have been widely used on mobile devices like smartphones for various
tasks (eg, visualizing personal health and financial data), making it convenient for people to …
tasks (eg, visualizing personal health and financial data), making it convenient for people to …
" What you think is private is no longer"--Investigating the Aftermath of Shoulder Surfing on Smartphones in Everyday Life through the Eyes of the Victims
Shoulder surfing has been studied extensively, however, it remains unexplored whether and
how it impacts users. Understanding this is important as it determines whether shoulder …
how it impacts users. Understanding this is important as it determines whether shoulder …
Introduction to Authentication using Behavioral Biometrics
The trend of ubiquitous computing goes in parallel with ubiquitous authentication, as users
must confirm their identity several times a day on their devices. Passwords are increasingly …
must confirm their identity several times a day on their devices. Passwords are increasingly …
Exploring Vulnerabilities in Remote VR User Studies
This position paper explores the possibilities and challenges of using Virtual Reality (VR) in
remote user studies. Highlighting the immersive nature of VR, the paper identifies key …
remote user studies. Highlighting the immersive nature of VR, the paper identifies key …
Pedestrian Interaction with a Snow Clearing Robot
In this paper, we investigate pedestrian interaction with a large autonomous robot that clears
snow from the sidewalk. Through a virtual reality (VR) based user study, simulating different …
snow from the sidewalk. Through a virtual reality (VR) based user study, simulating different …
Two-way Robust Authentication Method to Prevent Shoulder Surfing Attack
Shoulder surfing is a sort of attack in which the attacker observes the victim's login
information and attempts to obtain unauthorized access to the system. This may be …
information and attempts to obtain unauthorized access to the system. This may be …