Purely automated attacks on passpoints-style graphical passwords

PC Van Oorschot, A Salehi-Abari… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We introduce and evaluate various methods for purely automated attacks against
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …

On purely automated attacks and click-based graphical passwords

A Salehi-Abari, J Thorpe… - 2008 Annual Computer …, 2008 - ieeexplore.ieee.org
We present and evaluate various methods for purely automated attacks against click-based
graphical passwords. Our purely automated methods combine click-order heuristics with …

[HTML][HTML] Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords.

J Thorpe, PC van Oorschot - USENIX Security Symposium, 2007 - usenix.org
Although motivated by both usability and security concerns, the existing literature on click-
based graphical password schemes using a single background image (eg, PassPoints) has …

Exploiting predictability in click-based graphical passwords

PC van Oorschot, J Thorpe - Journal of Computer Security, 2011 - content.iospress.com
We provide an in-depth study of the security of click-based graphical password schemes like
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …

A closer look at recognition-based graphical passwords on mobile devices

P Dunphy, AP Heiner, N Asokan - … of the Sixth Symposium on Usable …, 2010 - dl.acm.org
Graphical password systems based on the recognition of photographs are candidates to
alleviate current over-reliance on alphanumeric passwords and PINs. However, despite …

PassBYOP: bring your own picture for securing graphical passwords

A Bianchi, I Oakley, H Kim - IEEE Transactions on Human …, 2015 - ieeexplore.ieee.org
PassBYOP is a new graphical password scheme for public terminals that replaces the static
digital images typically used in graphical password systems with personalized physical …

EvoPass: Evolvable graphical password against shoulder-surfing attacks

X Yu, Z Wang, Y Li, L Li, WT Zhu, L Song - Computers & Security, 2017 - Elsevier
The passwords for authenticating users are susceptible to shoulder-surfing attacks in which
attackers learn users' passwords through direct observations without any technical support …

Shoulder surfing defence for recall-based graphical passwords

NH Zakaria, D Griffiths, S Brostoff, J Yan - Proceedings of the seventh …, 2011 - dl.acm.org
Graphical passwords are often considered prone to shoulder-surfing attacks, where
attackers can steal a user's password by peeking over his or her shoulder in the …

Graphical password: prevent shoulder-surfing attack using digraph substitution rules

LY Por, CS Ku, A Islam, TF Ang - Frontiers of Computer Science, 2017 - Springer
In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism
or activity required to derive password-images is proposed. In the proposed method, a user …

Brute-force and dictionary attack on hashed real-world passwords

L Bošnjak, J Sreš, B Brumen - 2018 41st international …, 2018 - ieeexplore.ieee.org
An information system is only as secure as its weakest point. In many information systems
that remains to be the human factor, despite continuous attempts to educate the users about …