Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Mobile security: Threats and best practices

P Weichbroth, Ł Łysik - Mobile Information Systems, 2020 - Wiley Online Library
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

S Chiasson, E Stobert, A Forget… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …

Multiple password interference in text passwords and click-based graphical passwords

S Chiasson, A Forget, E Stobert… - Proceedings of the 16th …, 2009 - dl.acm.org
The underlying issues relating to the usability and security of multiple passwords are largely
unexplored. However, we know that people generally have difficulty remembering multiple …

Purely automated attacks on passpoints-style graphical passwords

PC Van Oorschot, A Salehi-Abari… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We introduce and evaluate various methods for purely automated attacks against
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …

Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords

A Forget, S Chiasson, R Biddle - … of the SIGCHI Conference on Human …, 2010 - dl.acm.org
We present Cued Gaze-Points (CGP) as a shoulder-surfing resistant cued-recall graphical
password scheme where users gaze instead of mouse-click. This approach has several …

Exploiting predictability in click-based graphical passwords

PC van Oorschot, J Thorpe - Journal of Computer Security, 2011 - content.iospress.com
We provide an in-depth study of the security of click-based graphical password schemes like
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …

EvoPass: Evolvable graphical password against shoulder-surfing attacks

X Yu, Z Wang, Y Li, L Li, WT Zhu, L Song - Computers & Security, 2017 - Elsevier
The passwords for authenticating users are susceptible to shoulder-surfing attacks in which
attackers learn users' passwords through direct observations without any technical support …