Picasso: Lightweight device class fingerprinting for web clients

E Bursztein, A Malyshev, T Pietraszek… - Proceedings of the 6th …, 2016 - dl.acm.org
In this work we present Picasso: a lightweight device class fingerprinting protocol that allows
a server to verify the software and hardware stack of a mobile or desktop client. As an …

Tapprints: your finger taps have fingerprints

E Miluzzo, A Varshavsky, S Balakrishnan… - Proceedings of the 10th …, 2012 - dl.acm.org
This paper shows that the location of screen taps on modern smartphones and tablets can
be identified from accelerometer and gyroscope readings. Our findings have serious …

Gossamer: Securely measuring password-based logins

MS Bohuk, M Islam, S Ahmad, M Swift… - 31st USENIX Security …, 2022 - usenix.org
Passwords remain the primary way to authenticate users online. Yet little is known about the
characteristics of login requests submitted to login systems due to the sensitivity of …

Two-thumbs-up: Physical protection for pin entry secure against recording attacks

DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee… - computers & …, 2018 - Elsevier
We present a new Personal Identification Number (PIN) entry method for smartphones that
can be used in security-critical applications, such as smartphone banking. The proposed …

[PDF][PDF] AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.

S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi - NDSS, 2014 - Citeseer
As mobile begins to overtake the fixed Internet access, ad networks have aggressively
sought methods to track users on their mobile devices. While existing countermeasures and …

Smudgesafe: Geometric image transformations for smudge-resistant user authentication

S Schneegass, F Steimle, A Bulling, F Alt… - Proceedings of the 2014 …, 2014 - dl.acm.org
Touch-enabled user interfaces have become ubiquitous, such as on ATMs or portable
devices. At the same time, authentication using touch input is problematic, since finger …

Device fingerprinting for cyber-physical systems: a survey

V Kumar, K Paul - ACM Computing Surveys, 2023 - dl.acm.org
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …

Sauth: Protecting user accounts from password database leaks

G Kontaxis, E Athanasopoulos, G Portokalidis… - Proceedings of the …, 2013 - dl.acm.org
Password-based authentication is the dominant form of access control in web services.
Unfortunately, it proves to be more and more inadequate every year. Even if users choose …

Strengthening user authentication through opportunistic cryptographic identity assertions

A Czeskis, M Dietz, T Kohno, D Wallach… - Proceedings of the 2012 …, 2012 - dl.acm.org
User authentication systems are at an impasse. The most ubiquitous method--the password--
has numerous problems, including susceptibility to unintentional exposure via phishing and …

BioTouchPass: Handwritten passwords for touchscreen biometrics

R Tolosana, R Vera-Rodriguez… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This work enhances traditional authentication systems based on Personal Identification
Numbers (PIN) and One-Time Passwords (OTP) through the incorporation of biometric …