Wearable augmented reality (AR) devices provide users a way to utilize computing resources while taking advantage of the world around them through context sensitivity. These AR devices, utilizing traditional technologies such as wi-fi and webbrowsers, often rely on users to enter an alphanumeric username and password via a keyboard mechanism provided by the device. We explore the security of a head-worn wearable AR device and keyboard mechanism available in the Microsoft Hololens. Specifically, we explore the feasibility of password compromise through a shoulder surfing attack, the unknown observation of a user during the password entry process. We find that from a set of commonly used passwords, it is relatively easy to identify the passwo...
Today\u27s hyper-connected consumers demand convenient ways to tune into information without switchi...
A large body of work investigated touch, mid-air, and gaze-based user authentication. However, littl...
The military relies heavily on computer systems. Without a strong method of authentication to access...
Information security is an area that IS researchers can and should contribute to (Zafar and Clark 20...
As adoption of Augmented Reality (AR) devices, such as the Microsoft Hololens, has been increasing i...
Augmented Reality (AR) Head-Mounted Displays (HMD) are increasingly used in industry to digitize pro...
Augmented and Virtual Reality (AR/VR) technology has advanced significantly in recent years, with re...
Wearables that constantly collect various sensor data of their users increase the chances for infere...
In this paper, we present a case study of potential security and privacy threats from virtual realit...
We present HoloPass, a mixed reality application for the HoloLens wearable device, which allows user...
Existing authentication systems is suffering with many weaknesses. In general, textual passwords are...
Shoulder-surfing – using direct observation techniques, such as looking over someone's shoulder...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
Wearable technologies such as smart-glasses can sense, store and display sensitive personal contents...
Frustrating text entry interface has been a major obstacle in participating in social activities in ...
Today\u27s hyper-connected consumers demand convenient ways to tune into information without switchi...
A large body of work investigated touch, mid-air, and gaze-based user authentication. However, littl...
The military relies heavily on computer systems. Without a strong method of authentication to access...
Information security is an area that IS researchers can and should contribute to (Zafar and Clark 20...
As adoption of Augmented Reality (AR) devices, such as the Microsoft Hololens, has been increasing i...
Augmented Reality (AR) Head-Mounted Displays (HMD) are increasingly used in industry to digitize pro...
Augmented and Virtual Reality (AR/VR) technology has advanced significantly in recent years, with re...
Wearables that constantly collect various sensor data of their users increase the chances for infere...
In this paper, we present a case study of potential security and privacy threats from virtual realit...
We present HoloPass, a mixed reality application for the HoloLens wearable device, which allows user...
Existing authentication systems is suffering with many weaknesses. In general, textual passwords are...
Shoulder-surfing – using direct observation techniques, such as looking over someone's shoulder...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
Wearable technologies such as smart-glasses can sense, store and display sensitive personal contents...
Frustrating text entry interface has been a major obstacle in participating in social activities in ...
Today\u27s hyper-connected consumers demand convenient ways to tune into information without switchi...
A large body of work investigated touch, mid-air, and gaze-based user authentication. However, littl...
The military relies heavily on computer systems. Without a strong method of authentication to access...