Back-of-device authentication on smartphones

A De Luca, E Von Zezschwitz, NDH Nguyen… - Proceedings of the …, 2013 - dl.acm.org
This paper presents BoD Shapes, a novel authentication method for smartphones that uses
the back of the device for input. We argue that this increases the resistance to shoulder …

Stay cool! understanding thermal attacks on mobile-based user authentication

Y Abdelrahman, M Khamis, S Schneegass… - Proceedings of the 2017 …, 2017 - dl.acm.org
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …

Gazetouchpass: Multimodal authentication using gaze and touch on mobile devices

M Khamis, F Alt, M Hassib, E von Zezschwitz… - Proceedings of the …, 2016 - dl.acm.org
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for
shoulder-surfing resistant user authentication on mobile devices. GazeTouchPass allows …

Security notions and advanced method for human shoulder-surfing resistant PIN-entry

MK Lee - IEEE transactions on information forensics and …, 2014 - ieeexplore.ieee.org
The personal identification number (PIN) is a well-known authentication method used in
various devices, such as ATMs, mobile devices, and electronic door locks. Unfortunately, the …

Prototyping usable privacy and security systems: Insights from experts

F Mathis, K Vaniea, M Khamis - International Journal of Human …, 2022 - Taylor & Francis
Iterative design, implementation, and evaluation of prototype systems is a common
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …

Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research

F Mathis, J O'Hagan, M Khamis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …

OneButtonPIN: A single button authentication method for blind or low vision users to improve accessibility and prevent eavesdropping

MV Kamarushi, SL Watson, GW Tigwell… - Proceedings of the ACM …, 2022 - dl.acm.org
A Personal Identification Number (PIN) is a widely adopted authentication method used by
smartphones, ATMs, etc. PINs offer strong security and can be reset when compromised …

Cuevr: Studying the usability of cue-based authentication for virtual reality

Y Abdelrahman, F Mathis, P Knierim, A Kettler… - Proceedings of the …, 2022 - dl.acm.org
Existing virtual reality (VR) authentication schemes are either slow or prone to observation
attacks. We propose CueVR, a cue-based authentication scheme that is resilient against …

Use the force: Evaluating {Force-Sensitive} authentication for mobile devices

K Krombholz, T Hupperich, T Holz - Twelfth symposium on usable …, 2016 - usenix.org
Modern, off-the-shelf smartphones provide a rich set of possible touchscreen interactions,
but knowledge-based authentication schemes still rely on simple digit or character input …

Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry

A Bianchi, I Oakley, DS Kwon - Interacting with computers, 2012 - academic.oup.com
Haptic and audio cues now appear commonly in computer interfaces, partially due to
inherent advantages such as their support for eyes-free interaction. Their invisible …