Back-of-device authentication on smartphones
A De Luca, E Von Zezschwitz, NDH Nguyen… - Proceedings of the …, 2013 - dl.acm.org
This paper presents BoD Shapes, a novel authentication method for smartphones that uses
the back of the device for input. We argue that this increases the resistance to shoulder …
the back of the device for input. We argue that this increases the resistance to shoulder …
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …
back of smartphones to enter stroke-based passwords. Users can switch sides during input …
Swipin: Fast and secure pin-entry on smartphones
E Von Zezschwitz, A De Luca, B Brunkow… - Proceedings of the 33rd …, 2015 - dl.acm.org
In this paper, we present SwiPIN, a novel authentication system that allows input of
traditional PINs using simple touch gestures like up or down and makes it secure against …
traditional PINs using simple touch gestures like up or down and makes it secure against …
ShakeIn: secure user authentication of smartphones with single-handed shakes
Smartphones have been widely used with a vast array of sensitive and private information
stored on these devices. To secure such information from being leaked, user authentication …
stored on these devices. To secure such information from being leaked, user authentication …
Colorsnakes: Using colored decoys to secure authentication in sensitive contexts
J Gugenheimer, A De Luca, H Hess, S Karg… - Proceedings of the 17th …, 2015 - dl.acm.org
In this paper we present ColorSnakes, a PIN-based authentication mechanism for
smartphones which uses fake paths on a grid of numbers to disguise user input. In a lab …
smartphones which uses fake paths on a grid of numbers to disguise user input. In a lab …
Towards baselines for shoulder surfing on mobile authentication
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime
target for credential leaking via shoulder surfing, a form of an observation attack. While the …
target for credential leaking via shoulder surfing, a form of an observation attack. While the …
I feel like I'm taking selfies all day! Towards understanding biometric authentication on smartphones
We present the results of an MTurk survey (n= 383) on the reasons for using and not using
biometric authentication systems on smartphones. We focused on Apple's Touch ID as well …
biometric authentication systems on smartphones. We focused on Apple's Touch ID as well …
Implicit sensor-based authentication of smartphone users with smartwatch
WH Lee, R Lee - Proceedings of the Hardware and Architectural Support …, 2016 - dl.acm.org
Smartphones are now frequently used by end-users as the portals to cloud-based services,
and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login …
and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login …
Waving authentication: your smartphone authenticate you on motion gesture
F Hong, M Wei, S You, Y Feng, Z Guo - Proceedings of the 33rd annual …, 2015 - dl.acm.org
User authentication is important to protect sensitive and private information for smartphone
users. We propose Waving Authentication (WA) which is a motion gesture authentication …
users. We propose Waving Authentication (WA) which is a motion gesture authentication …
Making graphic-based authentication secure against smudge attacks
E Von Zezschwitz, A Koslow, A De Luca… - Proceedings of the …, 2013 - dl.acm.org
Most of today's smartphones and tablet computers feature touchscreens as the main way of
interaction. By using these touchscreens, oily residues of the users' fingers, smudge, remain …
interaction. By using these touchscreens, oily residues of the users' fingers, smudge, remain …