[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021 - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …

This pin can be easily guessed: Analyzing the security of smartphone unlock pins

P Markert, DV Bailey, M Golla… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …

{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage

P Cronin, X Gao, C Yang, H Wang - 30th USENIX Security Symposium …, 2021 - usenix.org
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …

Stay home! Conducting remote usability evaluations of novel real-world authentication systems using virtual reality

F Mathis, J O'hagan, K Vaniea, M Khamis - Proceedings of the 2022 …, 2022 - dl.acm.org
Evaluating interactive systems often requires researchers to invite user study participants to
the lab. However, corresponding evaluations often lack realism and participants are usually …

Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research

F Mathis, J O'Hagan, M Khamis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …

On the security of smartphone unlock pins

P Markert, DV Bailey, M Golla, M Dürmuth… - ACM Transactions on …, 2021 - dl.acm.org
In this article, we provide the first comprehensive study of user-chosen four-and six-digit
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …

Draw it as shown: Behavioral pattern lock for mobile user authentication

Y Ku, LH Park, S Shin, T Kwon - IEEE Access, 2019 - ieeexplore.ieee.org
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …

[HTML][HTML] Bu-Dash: a universal and dynamic graphical password scheme (extended version)

P Andriotis, M Kirby, A Takasu - International Journal of Information …, 2023 - Springer
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …

PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices

M Bâce, A Saad, M Khamis… - … on Privacy Enhancing …, 2022 - petsymposium.org
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …