The role of eye gaze in security and privacy applications: Survey and future HCI research directions
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …
applications. We present a holistic view on gaze-based security applications. In particular …
[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
Out-of-device privacy unveiled: Designing and validating the out-of-device privacy scale (odps)
This paper proposes an Out-of-Device Privacy Scale (ODPS)-a reliable, validated
psychometric privacy scale that measures users' importance of out-of-device privacy. In …
psychometric privacy scale that measures users' importance of out-of-device privacy. In …
PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …
presence of a bystander using the phone's front-facing camera. However, a person's face in …
Private reader: Using eye tracking to improve reading privacy in public spaces
Reading in public spaces can often be tricky if we wish to keep the contents away from the
prying eye. We propose Private Reader, an eye-tracking approach towards maintaining …
prying eye. We propose Private Reader, an eye-tracking approach towards maintaining …
The interplay between personal relationships & shoulder surfing mitigation
Shoulder surfing refers to observing someone's device screen without their consent.
Conspicuously switching off the screen upon noticing a friend observing private messages …
Conspicuously switching off the screen upon noticing a friend observing private messages …
Shoulder surfing through the social lens: A longitudinal investigation & insights from an exploratory diary study
Shoulder surfing is a prevailing threat when accessing information on personal devices like
smartphones. Adequate mitigation requires studying shoulder surfing occurrences in …
smartphones. Adequate mitigation requires studying shoulder surfing occurrences in …
A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …
resources needed to carry out such attacks are becoming increasingly available and, hence …
{Eye-Shield}:{Real-Time} Protection of Mobile Device Screen Information from Shoulder Surfing
People use mobile devices ubiquitously for computing, communication, storage, web
browsing, and more. As a result, the information accessed and stored within mobile devices …
browsing, and more. As a result, the information accessed and stored within mobile devices …