skip to main content
10.1145/2493190.2494435acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
poster

A tap and gesture hybrid method for authenticating smartphone users

Authors Info & Claims
Published:27 August 2013Publication History

ABSTRACT

This paper presents a new tap and gesture hybrid method for authenticating mobile device users. The new technique augments four simple gestures - up, down, left, and right, to the dominant digit lock technique, allowing users to either tap or perform any one of the four gestures on the digit keys. It offers in total 6250000 unique four-symbol password combinations, which is substantially more than the conventional techniques. Results of a pilot study showed that the new technique was slower and more error prone than the digit lock technique. However, we believe with practice it could get faster and more accurate. Also, most users were comfortable and all of them felt more secured while using the new technique.

References

  1. Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In Proc.WOOT '10. USENIX (2010), 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Biddle, R., Mannan, M., Van Oorschot, P. C., and Whalen, T. User study, analysis, and usable security of passwords based on digital objects. Trans. Info. For. Sec. 6, 3 (2011), 970--979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chiasson, S., Forget, A., Biddle, R., and van Oorschot, P. C. User interface design affects security: patterns in click-based graphical passwords. Int. J. Inf. Security 8, 6 (2009), 387--398. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Clarke, N. L. and Furnell, S. M. Advanced user authentication for mobile devices. Computers & Security 26, 2 (2007), 109--119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Davies, D. W. and Price, W. L. Security for Computer Networks. John Wiley & Sons, Inc., 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dhamija, R. and Perrig, A. Déjà Vu: a user study using images for authentication. In Proc. SSYM '00. USENIX (2000), 4--4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jakobsson, M. and Akavipat, R. Rethinking passwords to adapt to constrained keyboards. In MoST Workshop '12. IEEE (2012).Google ScholarGoogle Scholar
  8. Jakobsson, M., Shi, E, Golle, P., and Chow, R. Implicit authentication for mobile devices. In Proc. HotSec '09. USENIX (2009), 9--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jansen, W. Authenticating mobile device users through image selection. Data Security, 2004.Google ScholarGoogle Scholar
  10. Kim, I. Keypad against brute force attacks on smartphones. IET Information Security 6, 2 (2012), 71--76.Google ScholarGoogle ScholarCross RefCross Ref
  11. Mannan, M. and Van Oorschot, P. C. Passwords for both mobile and desktop computers: ObPwd for Firefox and Android. USENIX 37, 4 (2012), 28--37.Google ScholarGoogle Scholar
  12. Nazir, I., Zubair, I., and Islam, M. H., User authentication for mobile device through image selection. In Proc. NDT '09. IEEE (2009), 518--520.Google ScholarGoogle ScholarCross RefCross Ref
  13. Nielsen Holdings. Two thirds of new mobile buyers now opting for smartphones. http://shar.es/xfZvs.Google ScholarGoogle Scholar
  14. Raguram, R., White, A. M., Goswami, D., Monrose, F., and Frahm, J.-M. iSpy: Automatic reconstruction of typed input from compromising reflections. In Proc. CCS '11. ACM (2011), 527--536. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Skillen, A. and Mannan, M. Myphrase: Passwords from your own words. Spectrum, Concordia University, Montreal, Quebec, Canada, 2013.Google ScholarGoogle Scholar
  16. Zhai, S. and Kristensson, P.-O. Shorthand writing on stylus keyboard. In Proc. CHI '03. ACM (2003), 97--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Zheng, Z., Liu, X., Yin, L., and Liu, Z. A stroke-based textual password authentication scheme. In Proc. ETCS '09. IEEE (2009), 90--95. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A tap and gesture hybrid method for authenticating smartphone users

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobileHCI '13: Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
        August 2013
        662 pages
        ISBN:9781450322737
        DOI:10.1145/2493190

        Copyright © 2013 Copyright is held by the owner/author(s)

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 August 2013

        Check for updates

        Qualifiers

        • poster

        Acceptance Rates

        MobileHCI '13 Paper Acceptance Rate53of238submissions,22%Overall Acceptance Rate202of906submissions,22%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader