2018
DOI: 10.1016/j.cose.2018.05.012
|View full text |Cite
|
Sign up to set email alerts
|

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…5 Pressed area size by the user's fingers. 6 Error rate, which is the frequency of using backspaces or deletion option.…”
Section: Gait-based Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…5 Pressed area size by the user's fingers. 6 Error rate, which is the frequency of using backspaces or deletion option.…”
Section: Gait-based Authenticationmentioning
confidence: 99%
“…Knowledge-based approaches rely on the knowledge of the user; i.e., the user must provide certain information such as numeric password, PIN, graphical sequence, or a picture gesture [4], to access a device [5]. Despite their simplicity, ease of implementation, and user acceptance, such approaches suffer from several shortcomings such as the inconvenience of frequent re-entering (especially when the knowledge used are long enough to convey strong security) and several adversarial attacks (e.g., shoulder surfing and smudge attacks) [6]- [10]. Another issue with knowledgebased authentication is the underlying assumption of having equal security requirements for all applications [11].…”
Section: Introductionmentioning
confidence: 99%
“…More users are willing to store private information on their devices and use them to process some sensitive information for mobility and convenience [27,50]. However, this also makes smartphones a major target by cyber-criminals [31]. If attackers get the phone and unlock it successfully, then they can easily steal all sensitive data.…”
Section: Introductionmentioning
confidence: 99%
“…Up to now, the most widely adopted authentication approach is still based on textual passwords. For example, iPhones use PIN code to protect the devices, but it may suffer many invasions, e.g., recording attacks [31]. In real-world applications, users have multiple accounts and may choose easy-to-remember passwords due to the multiple password inference [28] and limitation of long term memory [49].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation