Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …

Evaluating user perception of multi-factor authentication: A systematic review

S Das, B Wang, Z Tingle, LJ Camp - arXiv preprint arXiv:1908.05901, 2019 - arxiv.org
Security vulnerabilities of traditional single factor authentication has become a major
concern for security practitioners and researchers. To mitigate single point failures, new and …

How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples

EM Redmiles, S Kross… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …

{SmartAuth}:{User-Centered} authorization for the internet of things

Y Tian, N Zhang, YH Lin, XF Wang, B Ur… - 26th USENIX Security …, 2017 - usenix.org
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …

Scaling the security wall: Developing a security behavior intentions scale (sebis)

S Egelman, E Peer - Proceedings of the 33rd annual ACM conference …, 2015 - dl.acm.org
Despite the plethora of security advice and online education materials offered to end-users,
there exists no standard measurement tool for end-user security behaviors. We present the …

Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …

" Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia

N Sambasivan, G Checkley, A Batool… - … Symposium on Usable …, 2018 - usenix.org
Women in South Asian own fewer personal devices like laptops and phones than women
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …

Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location

L Fridman, S Weber, R Greenstadt… - IEEE Systems …, 2016 - ieeexplore.ieee.org
Active authentication is the problem of continuously verifying the identity of a person based
on behavioral aspects of their interaction with a computing device. In this paper, we collect …

Users' expectations about and use of smartphone privacy and security settings

A Frik, J Kim, JR Sanchez, J Ma - … of the 2022 CHI Conference on Human …, 2022 - dl.acm.org
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …

Cracking android pattern lock in five attempts

G Ye, Z Tang, D Fang, X Chen, KI Kim… - Proceedings of the …, 2017 - eprints.whiterose.ac.uk
Pattern lock is widely used as a mechanism for authentication and authorization on Android
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …