Proceedings of the Seventh Symposium on Usable Privacy and Security 2011
DOI: 10.1145/2078827.2078834
|View full text |Cite
|
Sign up to set email alerts
|

Breaking undercover

Abstract: This paper reports two attacks on Undercover, a human authentication scheme against passive observers proposed at CHI 2008. The first attack exploits nonuniform human behavior in responding to authentication challenges and the second one is based on information leaked from authentication challenges or responses visible to the attacker. The second attack can be generalized to break two alternative Undercover designs presented at Pervasive 2009. All the attacks exploit design flaws of the Undercover implementati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…Andrea Bianchi et al [8], proposed a system in 2011 which prevents the hacking of the password in public places .The authentication is made using pin or passcodes that depends on the unobservable tactile or audio cues .spinlock is methodology proposed by the author. It has high load of cognitive loads in terms of processing, mapping or recalling non visual information.…”
Section: Literature Surveymentioning
confidence: 99%
“…Andrea Bianchi et al [8], proposed a system in 2011 which prevents the hacking of the password in public places .The authentication is made using pin or passcodes that depends on the unobservable tactile or audio cues .spinlock is methodology proposed by the author. It has high load of cognitive loads in terms of processing, mapping or recalling non visual information.…”
Section: Literature Surveymentioning
confidence: 99%