Towards Baselines for Shoulder Surfing on Mobile Authentication

dc.contributor.authorAviv, Adam J.
dc.contributor.authorDavin, John T.
dc.contributor.authorWolf, Flynn
dc.contributor.authorKuber, Ravi
dc.date.accessioned2020-10-13T18:23:47Z
dc.date.available2020-10-13T18:23:47Z
dc.date.issued2017-12
dc.descriptionACSAC 2017, Orlando, FL, USA, December 4–8, 2017en_US
dc.description.abstractGiven the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the research community has investigated solutions to minimize or prevent the threat of shoulder surfing, our understanding of how the attack performs on current systems is less well studied. In this paper, we describe a large online experiment (n = 1173) that works towards establishing a baseline of shoulder surfing vulnerability for current unlock authentication systems. Using controlled video recordings of a victim entering in a set of 4- and 6-length PINs and Android unlock patterns on different phones from different angles, we asked participants to act as attackers, trying to determine the authentication input based on the observation. We find that 6-digit PINs are the most elusive attacking surface where a single observation leads to just 10.8% successful attacks (26.5% with multiple observations). As a comparison, 6-length Android patterns, with one observation, were found to have an attack rate of 64.2% (79.9% with multiple observations). Removing feedback lines for patterns improves security to 35.3% (52.1% with multiple observations). This evidence, as well as other results related to hand position, phone size, and observation angle, suggests the best and worst case scenarios related to shoulder surfing vulnerability which can both help inform users to improve their security choices, as well as establish baselines for researchers.en_US
dc.description.sponsorshipWe thank Courtney Tse for her assistance conducting user studies. This research is funded by the National Security Agency and the Office of Naval Research (N00014-15-1-2776).en_US
dc.description.urihttps://dl.acm.org/doi/10.1145/3134600.3134609en_US
dc.format.extent13 pagesen_US
dc.genreconference papers and proceedingsen_US
dc.identifierdoi:10.13016/m2r72d-udi6
dc.identifier.citationAviv, Adam J.; Davin, John T.; Wolf, Flynn; Kuber, Ravi; Towards Baselines for Shoulder Surfing on Mobile Authentication; ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference, December 2017, Pages 486–498; https://dl.acm.org/doi/10.1145/3134600.3134609;en_US
dc.identifier.urihttp://hdl.handle.net/11603/19836
dc.identifier.urihttps://doi.org/10.1145/3134600.3134609
dc.language.isoen_USen_US
dc.publisherAssociation for Computing Machineryen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rightsPublic Domain Mark 1.0*
dc.rightsThis work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law.
dc.rights.urihttp://creativecommons.org/publicdomain/mark/1.0/*
dc.titleTowards Baselines for Shoulder Surfing on Mobile Authenticationen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3134600.3134609.pdf
Size:
2.07 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: