2018
DOI: 10.1145/3287052
|View full text |Cite
|
Sign up to set email alerts
|

CueAuth

Abstract: Secure authentication on situated displays (e.g., to access sensitive information or to make purchases) is becoming increasingly important. A promising approach to resist shoulder surfing attacks is to employ cues that users respond to while authenticating; this overwhelms observers by requiring them to observe both the cue itself as well as users' response to the cue. Although previous work proposed a variety of modalities, such as gaze and mid-air gestures, to further improve security, an understanding of ho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

9
92
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

4
3

Authors

Journals

citations
Cited by 41 publications
(103 citation statements)
references
References 58 publications
(108 reference statements)
9
92
2
Order By: Relevance
“…Several works used smooth pursuit eye movements to allow users to enter 4-digit PINs on a public display [27,80,83]. Other researchers explored the augmentation of graphical password schemes by using gaze input.…”
Section: Legacy Passwordsmentioning
confidence: 99%
See 2 more Smart Citations
“…Several works used smooth pursuit eye movements to allow users to enter 4-digit PINs on a public display [27,80,83]. Other researchers explored the augmentation of graphical password schemes by using gaze input.…”
Section: Legacy Passwordsmentioning
confidence: 99%
“…This method has been adopted by several unimodal authentication schemes [20,33,44]. An alternative is to detect certain gaze behaviors that would indicate input, such as gaze gestures [36] as done in EyePassShapes [32], or smooth pursuit eye movements [27,83,126,127,164].…”
Section: Unimodal Gaze-based Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…To evaluate the observation resistance, we measured the Levenshtein distance between the guesses and the correct password to analyze how close the guess is to the correct password. The Levenshtein distance refers to the distance between the attackers' guesses and the correct password; it is a commonly used metric in security analysis that reveals how close a guess is to the original password [13,21,25]. Thus, Levenshtein distance was the dependent variable.…”
Section: Dependent Variables and Hypothesesmentioning
confidence: 99%
“…While recent work compared multiple modalities for cue-based authentication [25], a comparison of multimodal authentication approaches is missing. To close this gap, we report on 6 concepts:…”
mentioning
confidence: 99%