Proceedings of the 16th International Conference on Mobile and Ubiquitous Multimedia 2017
DOI: 10.1145/3152832.3152851
|View full text |Cite
|
Sign up to set email alerts
|

They are all after you

Abstract: Many of the authentication schemes for mobile devices that were proposed lately complicate shoulder surfing by splitting the attacker's attention into two or more entities. For example, multimodal authentication schemes such as Gaze-TouchPIN and GazeTouchPass require attackers to observe the user's gaze input and the touch input performed on the phone's screen. These schemes have always been evaluated against single observers, while multiple observers could potentially attack these schemes with greater ease, s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…In both the replication study and the real-world study [52] the attacks were single-person attacks through optimal views on the authentication scheme and the interaction -this depicts a best case scenario for the attacker. Using non-optimal or user-defined views, or more advanced threat models (e.g., multiple observers [48]), could result in different findings. Third, following Khamis et al 's [52] study design means facing the same limitations.…”
Section: Limitationsmentioning
confidence: 99%
“…In both the replication study and the real-world study [52] the attacks were single-person attacks through optimal views on the authentication scheme and the interaction -this depicts a best case scenario for the attacker. Using non-optimal or user-defined views, or more advanced threat models (e.g., multiple observers [48]), could result in different findings. Third, following Khamis et al 's [52] study design means facing the same limitations.…”
Section: Limitationsmentioning
confidence: 99%
“…Suitable threat models should be employed when evaluating the security of authentication schemes. For example, previous work evaluated multimodal authentication schemes against two observers [76] and by using video record-ings from two cameras [74]. Commonly studied threats include shoulder surfing attacks [39], video attacks [32], thermal attacks [1], and smudge attacks [11].…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…However, we expect that performing it against gaze input would still be challenging due to the large number of cues that the attacker would have to observe, in addition to the eye movements. Another direction for future work is to evaluate our methods against other observation-based threat models, such as the insider model [60], and the case of having multiple attackers observation the user simultaneously [31]. The latter is particularly relevant for public displays, where it is typical that a group surrounds the user during interaction [32].…”
Section: Further Threat Modelsmentioning
confidence: 99%