2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.61
|View full text |Cite
|
Sign up to set email alerts
|

SysPal: System-Guided Pattern Locks for Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
54
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(57 citation statements)
references
References 24 publications
3
54
0
Order By: Relevance
“…However, the objective of our study was to determine whether informing users about connectivity rules through the highlighting mechanism had any impact on their pattern choices which we found to be statistically significant with this small sample. We note that our sample size (99 participants) is larger than that of Cho et al lab study (46 participants) [13].…”
Section: Limitationsmentioning
confidence: 66%
See 1 more Smart Citation
“…However, the objective of our study was to determine whether informing users about connectivity rules through the highlighting mechanism had any impact on their pattern choices which we found to be statistically significant with this small sample. We note that our sample size (99 participants) is larger than that of Cho et al lab study (46 participants) [13].…”
Section: Limitationsmentioning
confidence: 66%
“…Moreover, the proportion of SysPal patterns that were cracked in 20 attempts are: 9.97% (1-dot), 9.36% (2-dot) and 14.11% (3-dot). These numbers suggest (also stated in [13]) that mandating too many points could potentially reduce the overall password space. Further, for patterns created using TinPal, the proportion of patterns cracked in 20 attempts is 0% (and 4% using ASIACCS'17 dataset [24]).…”
Section: A Android Pattern Lockmentioning
confidence: 84%
“…This bias can be used by adversaries to improve their guess on unlock patterns. Figure 1 gives the 12 most common unlock patterns in the real world, according to a recent empirical study [9]. In our user study, we focus on stealing these most likely patterns only, for the following reasons.…”
Section: Phone Unlock Patternsmentioning
confidence: 99%
“…We believe our design choice is sufficient for the purpose. Figure 1: The twelve most popular unlock patterns according to [9]. An unlock pattern connects a number of dots, and it can be decomposed into several strokes separated by inflections.…”
Section: Phone Unlock Patternsmentioning
confidence: 99%
See 1 more Smart Citation