Spyware Resistant Smartphone User Authentication Scheme

@article{Kim2014SpywareRS,
  title={Spyware Resistant Smartphone User Authentication Scheme},
  author={Taejin Kim and Jeong Hyun Yi and Changho Seo},
  journal={International Journal of Distributed Sensor Networks},
  year={2014},
  volume={10}
}
As smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is increasingly important. The commonly used 4-digit PIN, however, is vulnerable to the Brute Force Attack, Shoulder-Surfing Attack, and Recording Attack. Various authentication techniques are being developed in order to solve these problems. However, the technique that provides perfect… Expand
A Survey on Mobile Phone Authentication
TLDR
An authentication mechanism is based on screen brightness which prevents and increases security against side channel attacks and the presence of malware in mobile platform can seriously impact the end users privacy and security. Expand
Using Screen Brightness to Improve Security in Mobile Social Network Access
TLDR
BrightPass protects the PIN code against automatic submissions carried out by malware while granting fast authentication phases and reduced error rates, and is compared with existing schemes in order to show its usability and security within the social network arena. Expand
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices
TLDR
A Completely Automatic Public Physical test to tell Computers and Humans Apart (CAPPCHA) is introduced as a way to enhance PIN authentication scheme for mobile devices and it is proved that the scheme is even more secure than CAPTCHA and fast and easy for users. Expand
Two-Factor Authentication Scheme Using One Time Password in Cloud Computing
TLDR
The results show that the proposed scheme can resist practical attacks, easy for users, does not have strong constrains, and does not require specific extra hardware to authenticate users in cloud computing. Expand
ClickPattern: A Pattern Lock System Resilient to Smudge and Side-channel Attacks
TLDR
A mechanism that enhances pattern lock security with resilience to smudge and side channel attacks, maintains a comparable level of memorability and provides ease of use that is still comparable with Pattern Lock while outperforming other schemes proposed in the literature is described. Expand
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices
TLDR
It is argued that the problem of the increasing sophistication of computers calls for more and more difficult cognitive tasks that make them either very long to solve or very prone to false negatives can be overcome by substituting the cognitive component of CAPTCHA with a different property that programs cannot mimic: the physical nature. Expand

References

SHOWING 1-10 OF 13 REFERENCES
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects
TLDR
Object-based Password (ObPwd), leveraging the universe of personal or personally meaningful digital content that many users now own or have access to, is proposed, which converts user-selected digital objects to high-entropy text passwords. Expand
Delegate the smartphone user? Security awareness in smartphone platforms
TLDR
A prediction model is built to identify users who trust the app repository and is assessed, evaluated and proved to be statistically significant and efficient. Expand
Use Your Illusion: secure authentication usable anywhere
TLDR
This paper proposes and evaluates Use Your Illusion, a novel mechanism for user authentication that is secure and usable regardless of the size of the device on which it is used and demonstrates that, regardless of their age or gender, users are very skilled at recognizing degraded versions of self-chosen images, even on small displays and after time periods of one month. Expand
Graphical passwords: Learning from the first twelve years
TLDR
This article first catalogues existing approaches, highlighting novel features of selected schemes and identifying key usability or security advantages, and reviews usability requirements for knowledge-based authentication as they apply to graphical passwords. Expand
A PIN-entry method resilient against shoulder surfing
TLDR
Alternative PIN entry methods are presented, which make it significantly harder for a criminal to obtain PINs even if he fully observes the entire input and output of a PIN entry procedure. Expand
Understanding Cryptography: A Textbook for Students and Practitioners
TLDR
The authors move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. Expand
Investigating User Behavior for Authentication Methods: A Comparison between Individuals with Down Syndrome and Neurotypical Users
TLDR
This research provides the first benchmark data on the performance of Individuals with DS when using multiple authentication methods and proposes design guidelines that aim to assist both practitioners and researchers in designing and developing effective authentication applications that fit the specific needs of individuals with DS. Expand
PassPoints: Design and longitudinal evaluation of a graphical password system
TLDR
PassPoints is described, a new and more secure graphical password system, and an empirical study comparing the use of PassPoints to alphanumeric passwords is reported, which shows that the graphical password users created a valid password with fewer difficulties than the alphan numeric users. Expand
Graphical passwords based on robust discretization
TLDR
This paper generalizes Blonder's graphical passwords to arbitrary images and solves a robustness problem that this generalization entails and introduces a robust discretization, based on multigrid discretizations. Expand
The psychology of human-computer interaction
TLDR
This work focuses on applying Psychology to Design Reprise, and the GOMS Model of Manuscript Editing, as an application to Information-Processing Psychology. Expand
...
1
2
...