2008 Annual Computer Security Applications Conference (ACSAC) 2008
DOI: 10.1109/acsac.2008.18
|View full text |Cite
|
Sign up to set email alerts
|

On Purely Automated Attacks and Click-Based Graphical Passwords

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
31
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(32 citation statements)
references
References 17 publications
1
31
0
Order By: Relevance
“…We further demonstrate how they can be used as an optimization for human-seeded dictionaries. As discussed under Related Work, additional results on patterns can be found in other papers [42,37,6,30].…”
Section: Discussionmentioning
confidence: 88%
See 2 more Smart Citations
“…We further demonstrate how they can be used as an optimization for human-seeded dictionaries. As discussed under Related Work, additional results on patterns can be found in other papers [42,37,6,30].…”
Section: Discussionmentioning
confidence: 88%
“…Chiasson et al [6] further compared the popularity of a set of click-order patterns across three different schemes: PassPoints, CCP, and PCCP. Salehi-Abari et al [37] defined additional patterns and demonstrated their exploitability with both strict and relaxed pattern definitions; an extension of that paper [30] indicates that some click-order patterns result in a better offline attack than S hs−ind herein, but the accuracy of S hs−dep herein remains superior. As such, human-seeded and click-order pattern based attacks are complimentary approaches: human seeded attacks offer better guessing accuracy such that they are the primary threat in online environments, whereas click-order pattern attacks find a higher percentage of passwords in an offline attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A good overview of popular graphical password schemes has been reported in [2]. Different usability studies have outlined the advantages of graphical passwords, such as their reasonable login and creation times, acceptable error rates, good general perception and reduced interference compared to text passwords, but also their vulnerabilities [27] [30]. As mentioned earlier, lock patterns are one type of recall-based graphical password [2].…”
Section: Related Workmentioning
confidence: 99%
“…In this scheme, users should choose several points on an image and click orderly on them within a tolerance for authentication. Security analyses find it vulnerable to hotspots and simple patterns within images [13,17,18]. A commercial version of PassPoints for the PocketPC is available from visKey for screen-unlock [16].…”
Section: Related Workmentioning
confidence: 99%