Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

A De Luca, M Harbach, E von Zezschwitz… - Proceedings of the …, 2014 - dl.acm.org
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …

Shoulder surfing defence for recall-based graphical passwords

NH Zakaria, D Griffiths, S Brostoff, J Yan - Proceedings of the seventh …, 2011 - dl.acm.org
Graphical passwords are often considered prone to shoulder-surfing attacks, where
attackers can steal a user's password by peeking over his or her shoulder in the …

Shoulder surfing attack in graphical password authentication

AH Lashkari, S Farmand, DOB Zakaria… - arXiv preprint arXiv …, 2009 - arxiv.org
Information and computer security is supported largely by passwords which are the principle
part of the authentication process. The most common computer authentication method is to …

Click passwords under investigation

K Gołofit - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
The paper explores one of the graphical authentication techniques as the possible solution
to the most important problems of traditional passwords. The aim of this work is to bring …

Passphrase and keystroke dynamics authentication: Usable security

B Bhana, S Flowerday - Computers & Security, 2020 - Elsevier
It was found that employees spend a total of 2.25 days within 60 days on password-related
activities. The time consumed by this is unproductive and has a negative impact on usability …

Illusionpin: Shoulder-surfing resistant authentication using hybrid images

A Papadopoulos, T Nguyen, E Durmus… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We address the problem of shoulder-surfing attacks on authentication schemes by
proposing IllusionPIN (IPIN), a PIN-based authentication method that operates on …

A graphical password based system for small mobile devices

WZ Khan, MY Aalsalem, Y Xiang - arXiv preprint arXiv:1110.3844, 2011 - arxiv.org
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. A graphical based password is one promising alternatives of …

[HTML][HTML] Shoulder surfing: From an experimental study to a comparative framework

L Bošnjak, B Brumen - International Journal of Human-Computer Studies, 2019 - Elsevier
Shoulder surfing is an attack vector widely recognized as a real threat-enough to warrant
researchers dedicating a considerable effort toward designing novel authentication methods …

Validated mutual authentication

ER Potter, PM Skirvin - US Patent 7,266,693, 2007 - Google Patents
BACKGROUND Individuals use netWorks such as the Internet to conduct business,
communicate With others, make purchases, per form online banking, pay bills, obtain …

Penetration Vision through Virtual Reality Headsets: Identifying 360 Videos from Head Movements

A Nguyen, X Zhang, Z Yan - arXiv preprint arXiv:2402.11446, 2024 - arxiv.org
In this paper, we present the first contactless side-channel attack for identifying 360 videos
being viewed in a Virtual Reality (VR) Head Mounted Display (HMD). Although the video …