Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems 2015
DOI: 10.1145/2702123.2702316
|View full text |Cite
|
Sign up to set email alerts
|

Glass Unlock

Abstract: This paper presents Glass Unlock, a novel concept using smart glasses for smartphone unlocking, which is theoretically secure against smudge attacks, shoulder-surfing, and camera attacks. By introducing an additional temporary secret like the layout of digits that is only shown on the private near-eye display, attackers cannot make sense of the observed input on the almost empty phone screen. We report a user study with three alternative input methods and compare them to current state-of-the-art systems. Our f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…As established authentication methods like Android unlock patterns [46] and text-based input [37] are very easy to observe, most prior work focused on investigating and proposing alternative authentication concepts which conceal the entered secret and make the authentication process observation-resistant. A literature review indicates that improved observation-resistance is usually achieved by visual overload (e.g., [18,45,40]), indirect input (e.g., [12,49]), multiplexed input (e.g., [35,44]) or by establishing a second, non-observable, communication channel (e.g., [4,11,26,36,51]). That is, the presentation style or interaction concept are usually modified in a way that makes the input harder to observe.…”
Section: Related Workmentioning
confidence: 99%
“…As established authentication methods like Android unlock patterns [46] and text-based input [37] are very easy to observe, most prior work focused on investigating and proposing alternative authentication concepts which conceal the entered secret and make the authentication process observation-resistant. A literature review indicates that improved observation-resistance is usually achieved by visual overload (e.g., [18,45,40]), indirect input (e.g., [12,49]), multiplexed input (e.g., [35,44]) or by establishing a second, non-observable, communication channel (e.g., [4,11,26,36,51]). That is, the presentation style or interaction concept are usually modified in a way that makes the input harder to observe.…”
Section: Related Workmentioning
confidence: 99%
“…We argue that authentication in virtual environments can improve practical security as the HMD serves as a secret channel between the user and the system. While established methods already perform well, we assume that the security could be further improved by switching to already published security-optimized concepts (e.g., [18], [54], [55]).…”
Section: B Seamless Authentication Improves Practical Securitymentioning
confidence: 99%
“…Usable Privacy and Security (USEC) researchers have proposed a plethora of novel authentication schemes (e.g., [18,19,40,52,60,105]). Developing and evaluating prototype authentication systems often involves non-commodity hardware (e.g., special smartphone prototypes [18], private near-eye displays [111], or eye trackers [49]), and complex study setups (e.g., [7,Figure 3], [50,Figure 2]). This makes corresponding usability and security evaluations often costly and time consuming.…”
Section: Introductionmentioning
confidence: 99%