2014
DOI: 10.1109/tsmc.2013.2270227
|View full text |Cite
|
Sign up to set email alerts
|

Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
52
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(53 citation statements)
references
References 33 publications
1
52
0
Order By: Relevance
“…Kim et al [19] used CogTool to evaluate the usability of a shoulder surfing resistant mobile user authentication system, and Sasse et al [28] combined CogTool with a user study to estimate the usability of a user authentication system. Kwon et al [20] used CPM-GOMS to investigate human shoulder surfers attacking PIN entry methods that rely on the evidence of effective human perceptual and cognitive capabilities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kim et al [19] used CogTool to evaluate the usability of a shoulder surfing resistant mobile user authentication system, and Sasse et al [28] combined CogTool with a user study to estimate the usability of a user authentication system. Kwon et al [20] used CPM-GOMS to investigate human shoulder surfers attacking PIN entry methods that rely on the evidence of effective human perceptual and cognitive capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Due to their ability to help designers and researchers evaluate human performance and refine user interface (UI) designs more easily without prototyping and user testing [13], cognitive models such as Keystroke-Level Model (KLM) [8] and other more complicated models following the GOMS (Goals, Operators, Methods, and Selection) rules [17] have been widely used in the Human-Computer Interaction (HCI) field. However, such models are relatively less known to and used by cyber security researchers and practitioners, except for some limited work on using human cognitive modeling tools to estimate usability of user authentication systems [19,20,28].…”
Section: Introductionmentioning
confidence: 99%
“…In response to this, studies have been carried out in order either to develop an input scheme that allows users to enter their password behind their smart phones so that they are safer from shoulder surfing attack than with the existing password entry methods or to design and implement a method using a CoverPad to prevent information leak by attacks such as peeping when the users enter their password by the touch screen method [27] [31]. In particular, the study that after standardized modeling of the shoulder surfing attack that is difficult to express by standardization, using a method like CPM-GOMS model, which can express it quantitatively and reviewed and tested the usability and safety of the qwerty keypad is one of the standardized studies related to shoulder surfing attack [26]. Xiaoyuan Suo et al proposed that a password that a Web or smart phone user should enter for user authentication can be divided into a text-based one and a picture-based one [4].…”
Section: Shoulder Surfing Attack and Password Input Schemementioning
confidence: 99%
“…Recently, it was discovered that the binary method is actually vulnerable to well-trained human attackers, and PIN-entry methods that are more resistant to such attacks have been proposed [8,9]. The design goal of these methods as well as the binary method is to prevent an observation attack by a human observer who does not use a recording device, and thus such countermeasures are suitable for the few situations in which an attacker cannot use a recording device such as a phone camera [8].…”
Section: Introductionmentioning
confidence: 99%