This pin can be easily guessed: Analyzing the security of smartphone unlock pins

P Markert, DV Bailey, M Golla… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …

On the security of smartphone unlock pins

P Markert, DV Bailey, M Golla, M Dürmuth… - ACM Transactions on …, 2021 - dl.acm.org
In this article, we provide the first comprehensive study of user-chosen four-and six-digit
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …

Bu-Dash: a universal and dynamic graphical password scheme (extended version)

P Andriotis, M Kirby, A Takasu - International Journal of Information …, 2023 - Springer
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …

Using a blocklist to improve the security of user selection of android patterns

CW Munyendo, M Grant, P Markert, TJ Forman… - … Symposium on Usable …, 2021 - usenix.org
Android patterns remain a popular method for unlocking smartphones, despite evidence
suggesting that many users choose easily guessable patterns. In this paper, we explore the …

Double patterns: a usable solution to increase the security of android unlock patterns

T Forman, A Aviv - Proceedings of the 36th Annual Computer Security …, 2020 - dl.acm.org
Android unlock patterns are still commonly used, and roughly 25% of the respondents to our
study use a pattern when unlocking their phone. Despite security issues, the design of the …

User Perceptions of Five-Word Passwords

X Wu, CW Munyendo, E Cosic, GA Flynn… - Proceedings of the 38th …, 2022 - dl.acm.org
Human-chosen passwords are often short, selected non-uniformly, and thus, susceptible to
automated guessing attacks. To help users to select more secure but memorable …

RePaLM: A Data-Driven AI Assistant for Making Stronger Pattern Choices

C Milousi, GE Raptis, C Katsini, C Katsanos - IFIP Conference on Human …, 2023 - Springer
Security mechanisms based on patterns, such as Pattern Lock, are commonly used to
prevent unauthorized access. They introduce several benefits, such as ease of use, an …

[PDF][PDF] Usability and security of risk-based authentication

P Markert - 2023 - philipp-markert.com
Usability and Security of Risk-based Authentication Page 1 Usability and Security of Risk-based
Authentication Philipp Markert Thesis Defense • July 28, 2023 • Bochum Page 2 Thesis Defense …

Securing knowledge-based authentication against online attackers

DV Bailey - 2023 - hss-opus.ub.ruhr-unibochum.de
Wissensbasierte Authentifizierungsmethoden (Englisch: knowledge-based authenticators,
KBAs), wie Passwörter und Persönliche Identifikationsnummern (PINs), werden oft aus einer …

[PDF][PDF] Bu-Dash

P Andriotis, M Kirby, A Takasu - 2022 - pure-oai.bham.ac.uk
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …