Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013
DOI: 10.1145/2462096.2462098
|View full text |Cite
|
Sign up to set email alerts
|

A pilot study on the security of pattern screen-lock methods and soft side channel attacks

Abstract: Graphical passwords that allow a user to unlock a smartphone's screen are one of the Android operating system's features and many users prefer them instead of traditional textbased codes. A variety of attacks has been proposed against this mechanism, of which notable are methods that recover the lock patterns using the oily residues left on screens when people move their fingers to reproduce the unlock code. In this paper we present a pilot study on user habits when setting a pattern lock and on their percepti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

10
78
0
3

Year Published

2014
2014
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 88 publications
(91 citation statements)
references
References 10 publications
10
78
0
3
Order By: Relevance
“…One of our objectives when we designed the experiment was to evaluate previous results we presented during a pilot study which examined (in a similar way) if there exist any heuristic rules that are responsible for specific biases in the provided patterns [1]. The experiments in this study were conducted using a web application, thus, the participants were not really interacting with a smartphone device but with the monitor of their computer.…”
Section: Comparison With Previous Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…One of our objectives when we designed the experiment was to evaluate previous results we presented during a pilot study which examined (in a similar way) if there exist any heuristic rules that are responsible for specific biases in the provided patterns [1]. The experiments in this study were conducted using a web application, thus, the participants were not really interacting with a smartphone device but with the monitor of their computer.…”
Section: Comparison With Previous Resultsmentioning
confidence: 99%
“…These are sub-patterns that exist in the password and provide information about the most common edges that were formed during the drawing of the pattern. A comparison with [1] shows that indeed the upper nodes are heavily utilized during password formation. Table 4 concatenates the results of our research describing user perceptions about the security of the Android Pattern-Lock method and their responses to our feedback prompt.…”
Section: Comparison With Previous Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…shoulder surfing [21], [25] and brute force attacks [13]), as well as attacks that are unique to graphical passwords due to traces and oily residues left on the screen (i.e. smudge attacks [11], [9,10]. Andriotis et al [9,10] focused on human factors that might affect the choice of graphical passwords on a smartphone (such as sub-patterns and starting points), which in combination with smudge attacks can be used to infer the graphical passwords.…”
Section: Related Workmentioning
confidence: 99%