Back-of-device authentication on smartphones

A De Luca, E Von Zezschwitz, NDH Nguyen… - Proceedings of the …, 2013 - dl.acm.org
This paper presents BoD Shapes, a novel authentication method for smartphones that uses
the back of the device for input. We argue that this increases the resistance to shoulder …

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

A De Luca, M Harbach, E von Zezschwitz… - Proceedings of the …, 2014 - dl.acm.org
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …

Swipin: Fast and secure pin-entry on smartphones

E Von Zezschwitz, A De Luca, B Brunkow… - Proceedings of the 33rd …, 2015 - dl.acm.org
In this paper, we present SwiPIN, a novel authentication system that allows input of
traditional PINs using simple touch gestures like up or down and makes it secure against …

ShakeIn: secure user authentication of smartphones with single-handed shakes

H Zhu, J Hu, S Chang, L Lu - IEEE transactions on mobile …, 2017 - ieeexplore.ieee.org
Smartphones have been widely used with a vast array of sensitive and private information
stored on these devices. To secure such information from being leaked, user authentication …

Colorsnakes: Using colored decoys to secure authentication in sensitive contexts

J Gugenheimer, A De Luca, H Hess, S Karg… - Proceedings of the 17th …, 2015 - dl.acm.org
In this paper we present ColorSnakes, a PIN-based authentication mechanism for
smartphones which uses fake paths on a grid of numbers to disguise user input. In a lab …

Towards baselines for shoulder surfing on mobile authentication

AJ Aviv, JT Davin, F Wolf, R Kuber - Proceedings of the 33rd Annual …, 2017 - dl.acm.org
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime
target for credential leaking via shoulder surfing, a form of an observation attack. While the …

I feel like I'm taking selfies all day! Towards understanding biometric authentication on smartphones

A De Luca, A Hang, E Von Zezschwitz… - Proceedings of the 33rd …, 2015 - dl.acm.org
We present the results of an MTurk survey (n= 383) on the reasons for using and not using
biometric authentication systems on smartphones. We focused on Apple's Touch ID as well …

Implicit sensor-based authentication of smartphone users with smartwatch

WH Lee, R Lee - Proceedings of the Hardware and Architectural Support …, 2016 - dl.acm.org
Smartphones are now frequently used by end-users as the portals to cloud-based services,
and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login …

Waving authentication: your smartphone authenticate you on motion gesture

F Hong, M Wei, S You, Y Feng, Z Guo - Proceedings of the 33rd annual …, 2015 - dl.acm.org
User authentication is important to protect sensitive and private information for smartphone
users. We propose Waving Authentication (WA) which is a motion gesture authentication …

Making graphic-based authentication secure against smudge attacks

E Von Zezschwitz, A Koslow, A De Luca… - Proceedings of the …, 2013 - dl.acm.org
Most of today's smartphones and tablet computers feature touchscreens as the main way of
interaction. By using these touchscreens, oily residues of the users' fingers, smudge, remain …