2015
DOI: 10.1007/978-3-319-23258-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Android Smudge Attack Prevention Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Image-based passwords are not vulnerable to brute force and dictionary attacks but are still vulnerable to shoulder surfing attacks (SSAs) [24]. To obtain the image password, the attacker may directly observe the selection pattern of the image or use a screen recorder that captures the selected series of images and can access the PINs and other sensitive information [29,30,31].…”
Section: The Drawback Of Image-based Recognition Techniquesmentioning
confidence: 99%
“…Image-based passwords are not vulnerable to brute force and dictionary attacks but are still vulnerable to shoulder surfing attacks (SSAs) [24]. To obtain the image password, the attacker may directly observe the selection pattern of the image or use a screen recorder that captures the selected series of images and can access the PINs and other sensitive information [29,30,31].…”
Section: The Drawback Of Image-based Recognition Techniquesmentioning
confidence: 99%