2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2016
DOI: 10.1109/iccic.2016.7919555
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and bypassing of pattern lock in android smartphone

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…We found that shoulder surfing attacks had lower success rates with the implementation of our algorithm. The algorithm has proved its efficiency as it reduces the 65% (13/20) success attack rate from one shoulder surfing observation to 25% (1/4) [5]. In testing, we found a user satisfaction rate of 79% (7.9/10) using patterns lock of length six or higher (Table 2).…”
Section: Simulated Attack Success Ratesmentioning
confidence: 75%
See 1 more Smart Citation
“…We found that shoulder surfing attacks had lower success rates with the implementation of our algorithm. The algorithm has proved its efficiency as it reduces the 65% (13/20) success attack rate from one shoulder surfing observation to 25% (1/4) [5]. In testing, we found a user satisfaction rate of 79% (7.9/10) using patterns lock of length six or higher (Table 2).…”
Section: Simulated Attack Success Ratesmentioning
confidence: 75%
“…Many ways that forgetful users or attackers can bypass the lock screen, though these processes are time consuming or result in data loss [5]. Because of these long processes, it is ideal for attackers to directly attack the lock screen.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the bot can apply brute force attack by setting all the possibilities onto the system which is an NP-hard problem. 1) Shoulder Surfing Attacks: Shoulder surfing attacks occur when a graphical password is generated in public places or it may observe with technical equipment [9,10]. Our CODP scheme can defeat in term of varying the location of characters in Captcha image in each attempt and a new challenge will occur which character is selected to process the next window for drawing the pattern and the grid points will not lead by the correct characters for the new image anymore.…”
Section: Security Analysis and Attacksmentioning
confidence: 99%
“…The graphical password can be used as an alternative to biometric systems or aggregate with them. The main issue of graphical password is shoulder surfing attack to capture the login credential such as during unlocking the smart phone [7], (see at [8][9][10]). In shoulder surfing attack, the login process can capture by direct observation or with external technical equipment (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, security issues easily occur via a leakage of pattern shapes [34]. Many attack methods may be used against patterns, such as guessing attacks that try to attack by guessing the pattern [6], [13], [38], shoulder surfing attacks that obtain the victim's pattern through an intentionally direct observation [28], [41], smudge attacks leveraging oily residues remaining on a touchscreen [8], and thermal imaging attacks exploiting thermal residues (i.e., heat traces left on a touchscreen, making them visible through thermal imaging) [1].…”
Section: Related Work a Android Pattern Lockmentioning
confidence: 99%