Continuous user authentication on mobile devices: Recent progress and remaining challenges
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …
in the use of mobile devices such as smart phones and tablets. With the increase in the use …
Evaluating user perception of multi-factor authentication: A systematic review
Security vulnerabilities of traditional single factor authentication has become a major
concern for security practitioners and researchers. To mitigate single point failures, new and …
concern for security practitioners and researchers. To mitigate single point failures, new and …
How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples
EM Redmiles, S Kross… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …
{SmartAuth}:{User-Centered} authorization for the internet of things
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …
such as the ability to control a lock. Unfortunately, because few users act based upon, or …
Scaling the security wall: Developing a security behavior intentions scale (sebis)
Despite the plethora of security advice and online education materials offered to end-users,
there exists no standard measurement tool for end-user security behaviors. We present the …
there exists no standard measurement tool for end-user security behaviors. We present the …
Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication
SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
" Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia
Women in South Asian own fewer personal devices like laptops and phones than women
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
Active authentication is the problem of continuously verifying the identity of a person based
on behavioral aspects of their interaction with a computing device. In this paper, we collect …
on behavioral aspects of their interaction with a computing device. In this paper, we collect …
Users' expectations about and use of smartphone privacy and security settings
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …
models for information privacy and security controls. Yet, their usability is largely …
Cracking android pattern lock in five attempts
Pattern lock is widely used as a mechanism for authentication and authorization on Android
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …