Towards Non-Observable Authentication for Mobile Devices
dc.contributor.author | Wolf, Flynn | |
dc.contributor.author | Kuber, Ravi | |
dc.contributor.author | Aviv, Adam J. | |
dc.date.accessioned | 2020-10-14T18:09:47Z | |
dc.date.available | 2020-10-14T18:09:47Z | |
dc.date.issued | 2016-06-22 | |
dc.description | 12th Symposium on Usable Privacy and Security (SOUPS 2016), June 22-24, 2016, Denver CO. | en_US |
dc.description.abstract | When faced with the threat of observational attacks, mobile device users may attempt to mask the graphical interface to authenticate entry, to reduce the likelihood of third parties viewing and recreating the authentication sequence. However, interacting nonvisually with a mobile interface is not without its own challenges. In this paper, we describe a study examining the efficacy of authenticating entry using both PINs and graphical patterns when the mobile interface is outside of the line of sight of third parties and the user (i.e. in the user’s pocket, bag, or shielded by the non-dominant hand). A tactile aid intended to provide awareness of the orientation of the mobile device and to support authentication sequence entry is also being evaluated as part of the research. | en_US |
dc.description.sponsorship | This work was supported by the Office of Naval Research (N00014-15-1-2776). | en_US |
dc.description.uri | https://www.usenix.org/sites/default/files/soups16poster9-wolf.pdf | en_US |
dc.format.extent | 5 pages | en_US |
dc.genre | conference papers and proceedings | en_US |
dc.identifier | doi:10.13016/m2uvxc-yqoa | |
dc.identifier.citation | Wolf, Flynn; Kuber, Ravi; Aviv, Adam J.; Towards Non-Observable Authentication for Mobile Devices; 12th Symposium on Usable Privacy and Security (SOUPS 2016); https://www.usenix.org/sites/default/files/soups16poster9-wolf.pdf | en_US |
dc.identifier.uri | http://hdl.handle.net/11603/19887 | |
dc.language.iso | en_US | en_US |
dc.publisher | USENIX | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Information Systems Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | Public Domain Mark 1.0 | * |
dc.rights | This work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law. | |
dc.rights.uri | http://creativecommons.org/publicdomain/mark/1.0/ | * |
dc.title | Towards Non-Observable Authentication for Mobile Devices | en_US |
dc.type | Text | en_US |