[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2628363.2628372acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
short-paper

BoD taps: an improved back-of-device authentication technique on smartphones

Published: 23 September 2014 Publication History

Abstract

Previous work in the literature has shown that back-of-device (BoD) authentication is significantly more secure than standard front-facing approaches. However, the only BoD method available to date (Bod Shapes) is difficult to perform, especially with one hand. In this paper we propose Bod Taps, a novel approach that simplifies BoD authentication while improving its usage. A controlled evaluation with 12 users revealed that Bod Taps and Bod Shapes perform equally good at unlocking the device, but Bod Taps allows users to enter passwords about twice faster than Bod Shapes. Moreover, Bod Taps is perceived as being more usable and less frustrating than Bod Shapes, either using one or two hands.

References

[1]
Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In Proc. USENIX WOOT (2010), 1--7.
[2]
Azenkot, S., Rector, K., Ladner, R., and Wobbrock, J. Passchords: secure multi-touch authentication for blind people. In Proc. ASSETS (2012), 159--166.
[3]
Bianchi, A., Oakley, I., Kostakos, V., and Kwon, D. S. The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices. In Proc. TEI (2011).
[4]
Bianchi, A., Oakley, I., and Kwon, D. Spinlock: A single-cue haptic and audio PIN input technique for authentication. In Proc. Haptic and Audio Interaction Design (2011), 81--90.
[5]
Burr, W. E., Dodson, D. F., Newton, E. M., Perlner, R. A., Polk, W. T., Gupta, S., and Nabbus, E. A. Electronic authentication guideline. NIST Special Publication 800-63-1, 2011.
[6]
Clarke, N., and Furnell, S. Authenticating mobile phone users using keystroke analysis. Intl. J. of Inf. Security 6, 1 (2007), 1--14.
[7]
De Luca, A., von Zezschwitz, E., and Hussmann, H. Vibrapass: secure authentication based on shared lies. In Proc. CHI (2009), 913--916.
[8]
De Luca, A., von Zezschwitz, E., Nguyen, N. D. H., Maurer, M.-E., Rubegni, E., Scipioni, M. P., and Langheinrich, M. Back-of-device authentication on smartphones. In Proc. CHI (2013), 2389--2398.
[9]
Hirotaka, N. Reassessing current cell phone designs: using thumb input effectively. In Proc. CHI EA (2003), 938--939.
[10]
Patel, S. N., Pierce, J. S., and Abowd, G. D. A gesture-based authentication scheme for untrusted public terminals. In Proc. UIST (2004), 157--160.
[11]
Takada, T., and Koike, H. Awase-e: Image-based authentication for mobile phones using user's favorite images. In Proc. MHCI (2003), 347--351.
[12]
Tari, F., Ozok, A. A., and Holden, S. H. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In Proc. SOUPS (2006), 56--66.
[13]
Weiss, R., and De Luca, A. Passshapes - utilizing stroke based authentication to increase password memorability. In Proc. NordiCHI (2008), 383--392.

Cited By

View all
  • (2024)A Metric to Assess the Reliability of Crowd-sourced SUS Scores: A Case Study on the PoPLar Authentication ToolProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688470(309-321)Online publication date: 30-Sep-2024
  • (2021)BackTrack: 2D Back-of-device Interaction Through Front TouchscreenProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445374(1-8)Online publication date: 6-May-2021
  • (2020)Impact of Hand Used on One-Handed Back-of-Device PerformanceProceedings of the ACM on Human-Computer Interaction10.1145/34273164:ISS(1-19)Online publication date: 4-Nov-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobileHCI '14: Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services
September 2014
664 pages
ISBN:9781450330046
DOI:10.1145/2628363
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 September 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. back of device interaction
  2. passwords
  3. unlocking

Qualifiers

  • Short-paper

Funding Sources

Conference

MobileHCI '14
Sponsor:

Acceptance Rates

MobileHCI '14 Paper Acceptance Rate 35 of 124 submissions, 28%;
Overall Acceptance Rate 202 of 906 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)1
Reflects downloads up to 17 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Metric to Assess the Reliability of Crowd-sourced SUS Scores: A Case Study on the PoPLar Authentication ToolProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688470(309-321)Online publication date: 30-Sep-2024
  • (2021)BackTrack: 2D Back-of-device Interaction Through Front TouchscreenProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445374(1-8)Online publication date: 6-May-2021
  • (2020)Impact of Hand Used on One-Handed Back-of-Device PerformanceProceedings of the ACM on Human-Computer Interaction10.1145/34273164:ISS(1-19)Online publication date: 4-Nov-2020
  • (2020)Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and BeyondProceedings of the 36th Annual Computer Security Applications Conference10.1145/3427228.3427240(249-262)Online publication date: 7-Dec-2020
  • (2020)Woodpecker: Secret Back-of-Device Tap Rhythms to Authenticate Mobile Users2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC42975.2020.9283239(2727-2733)Online publication date: 11-Oct-2020
  • (2019)User strategies for mobile device-based interactions to prevent shoulder surfingProceedings of the 18th International Conference on Mobile and Ubiquitous Multimedia10.1145/3365610.3368412(1-5)Online publication date: 26-Nov-2019
  • (2018)PalmTouchProceedings of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3173574.3173934(1-13)Online publication date: 21-Apr-2018
  • (2018)Fingers' Range and Comfortable Area for One-Handed Smartphone Interaction Beyond the TouchscreenProceedings of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3173574.3173605(1-12)Online publication date: 21-Apr-2018
  • (2017)βTapProceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services10.1145/3098279.3125440(1-6)Online publication date: 4-Sep-2017
  • (2016)Less Is MoreProceedings of the 2016 ACM International Conference on Interactive Surfaces and Spaces10.1145/2992154.2992166(5-11)Online publication date: 6-Nov-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media