Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660360
|View full text |Cite
|
Sign up to set email alerts
|

Beware, Your Hands Reveal Your Secrets!

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
76
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 121 publications
(77 citation statements)
references
References 13 publications
1
76
0
Order By: Relevance
“…Some of the early work in this area rely on video footage filmed using a camera directly facing the screen or the keyboard [4,16]. Latest work shows that this limit can be lifted by exploiting spatial-temporal dynamics of the hands during typing [23]. Despite the success of video-based attacks on PIN-and textbased passwords, no work so far has exploited video-based side-channels to crack pattern lock.…”
Section: *Corresponding Authors: Zhanyong Tang and Zheng Wangmentioning
confidence: 99%
See 3 more Smart Citations
“…Some of the early work in this area rely on video footage filmed using a camera directly facing the screen or the keyboard [4,16]. Latest work shows that this limit can be lifted by exploiting spatial-temporal dynamics of the hands during typing [23]. Despite the success of video-based attacks on PIN-and textbased passwords, no work so far has exploited video-based side-channels to crack pattern lock.…”
Section: *Corresponding Authors: Zhanyong Tang and Zheng Wangmentioning
confidence: 99%
“…Our approach is to generate a set of candidate patterns for each of the Android pattern grids and the attacker can simply decide which set of candidate patterns to use after seeing the target device (at the time the layout of the grid will become available). However, unlike prior work on video-based attacks on keystroke based authentication [23], our approach does not require having knowledge of the console's geometry. In other words, the size of the screen or the position of the pattern grid on the screen does not affect the accuracy of our attack.…”
Section: Examples Of Filming Scenariosmentioning
confidence: 99%
See 2 more Smart Citations
“…Although new methods are proposed to increase their I/O capability, their security is less addressed with most authentication methods being the same as those for smartphones (e.g., [3,5,11,14]). Recent studies further raised the security concern for smartwatches (e.g., [12,15]). …”
Section: Introductionmentioning
confidence: 99%