Picture gesture authentication has been recently introduced as an alternative login experience to text-based password on touch-screen devices. In particular, the newly on market Microsoft Windows 8TM operating system adopts such an alternative authentication to complement its traditional text-based authentication. We present an empirical analysis of picture gesture authentication on more than 10,000 picture passwords collected from more than 800 subjects through online user studies. Based on the findings of our user studies, we propose a novel attack framework that is capable of cracking passwords on previously unseen pictures in a picture gesture authentication system. Our approach is based on the concept of selection function that models ...
One of the most important primitive security mechanisms is the authentication system. Authentication...
Text passwords are still the primary authentication mechanism for computers and online systems world...
Fraud and identity theft account for large financial loses each year. One critical component present...
Computing devices with touch-screens have experi-enced unprecedented growth in recent years. Such an...
Microsoft’s Picture Password provides a method to authenticate a user without the need of typing a c...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
The military relies heavily on computer systems. Without a strong method of authentication to access...
Touchscreen gestures are attracting research attention as an authentication method. While studies ha...
Research on gesture passwords suggest they are highly usable and secure, leading them to be proposed...
Gestures are a topic of increasing interest in authentication and successful implementation as a sec...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Over the years, various picture-based password systems were proposed to exploit the utility of pict...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
Password authentication is failing as an authentication since it increases the user burden to rememb...
Usable security has unique usability challenges because the need for security often means that stand...
One of the most important primitive security mechanisms is the authentication system. Authentication...
Text passwords are still the primary authentication mechanism for computers and online systems world...
Fraud and identity theft account for large financial loses each year. One critical component present...
Computing devices with touch-screens have experi-enced unprecedented growth in recent years. Such an...
Microsoft’s Picture Password provides a method to authenticate a user without the need of typing a c...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
The military relies heavily on computer systems. Without a strong method of authentication to access...
Touchscreen gestures are attracting research attention as an authentication method. While studies ha...
Research on gesture passwords suggest they are highly usable and secure, leading them to be proposed...
Gestures are a topic of increasing interest in authentication and successful implementation as a sec...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Over the years, various picture-based password systems were proposed to exploit the utility of pict...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
Password authentication is failing as an authentication since it increases the user burden to rememb...
Usable security has unique usability challenges because the need for security often means that stand...
One of the most important primitive security mechanisms is the authentication system. Authentication...
Text passwords are still the primary authentication mechanism for computers and online systems world...
Fraud and identity theft account for large financial loses each year. One critical component present...