scispace - formally typeset
Journal ArticleDOI

User biometric information-based secure method for smart devices

TLDR
The potential security problems caused by simple and weak passwords are studied, drawbacks of some conventional works are discussed, and 3 creative schemes to increase the complexity and strength of passwords by applying the envisioned features are proposed.
Abstract
Summary Secure mechanisms have been adapted to satisfy the needs of mobile subscribers; however, the mobile environment is quite different from a desktop PC or laptop-based environment. The existing attack patterns in mobile environments are also quite different, and the countermeasures applied should be enhanced. In regards to usability, the mobile environment is based on mobility, and thus, mobile devices are designed and developed to enhance the owner's efficiency. To avoid forgetting passwords, people are willing to adopt simple alphanumeric-character combinations, which are easy to remember and convenient to enter. As a result, the passwords have a high probability of being cracked or exposed. In this paper, we study the potential security problems caused by simple and weak passwords, discuss drawbacks of some conventional works, and propose 3 creative schemes to increase the complexity and strength of passwords by applying the envisioned features. Note that our proposals are based on the assumption that the textual passwords are not difficult for users to remember or enter and do not cause inconvenience to users. In other words, the proposed methods can increase the complexity of simple passwords without the awareness of users.

read more

Citations
More filters
Journal ArticleDOI

Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives

TL;DR: A comprehensive survey on the solutions of machine learning algorithms to improve the security of mobile phone touch screen devices including the analysis and synthesis of the algorithms and methodologies provided for those solutions.
Journal ArticleDOI

Intelligent approaches for security technologies

TL;DR: This paper presented a comprehensive and accurate solution to detect and prevent intrusions in cloud computing systems by using a hybrid method called HIDCC, which outperforms both a well-known multi-resource negotiation-based task allocation method and a max-sum belief propagation–based method.
Book ChapterDOI

A Survey on Graphical Authentication System Resisting Shoulder Surfing Attack

TL;DR: In this paper, an overview of various graphical authentication systems is presented and various graphical systems shown to be more secure when compared to other authentication systems are proposed.
References
More filters
Journal ArticleDOI

Users are not the enemy

TL;DR: It is argued that to change this state of affairs, security departments need to communicate more with users, and adopt a usercentered design approach.

Smudge attacks on smartphone touch screens

TL;DR: This paper examines the feasibility of smudge attacks on touch screens for smartphones, and focuses on the Android password pattern, and provides a preliminary analysis of applying the information learned in a smudge attack to guessing an Android passwordpattern.
Proceedings Article

TouchLogger: inferring keystrokes on touch screen from smartphone motion

TL;DR: This work describes a new side channel, motion, on touch screen smartphones with only soft keyboards, and developed TouchLogger, an Android application that extracts features from device orientation data to infer keystrokes.
Proceedings ArticleDOI

Tapprints: your finger taps have fingerprints

TL;DR: The location of screen taps on modern smartphones and tablets can be identified from accelerometer and gyroscope readings, and TapPrints, a framework for inferring the location of taps on mobile device touch-screens using motion sensor data combined with machine learning analysis is presented.
Book ChapterDOI

A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs

TL;DR: It is found that guessing PINs based on the victims’ birthday will enable a competent thief to gain use of an ATM card once for every 11–18 stolen wallets, depending on whether banks prohibit weak PINs such as 1234.