Skip to main content

Pattern Lock Evaluation Framework for Mobile Devices: Human Perception of the Pattern Strength Measure

  • Conference paper
  • First Online:
Man-Machine Interactions 5 (ICMMI 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 659))

Included in the following conference series:

Abstract

In this paper we present a multiplatform research framework for acquisition of pattern locks and evaluation of their strength. Along with the design features of the framework itself we provide the analysis of the data set of more than 300 pattern locks acquired by means of this solution. In particular we compare the subjective human rating of pattern memorizability and complexity with the numerical values of pattern strength measure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: WISEC 2013, pp. 1–6. ACM, Budapest (2013)

    Google Scholar 

  2. Aviv, A.J., Fichter, D.: Understanding visual perceptions of usability and security of android’s graphical password pattern. In: CSAC 2014, pp. 286–295. ACM, New Orleans (2014)

    Google Scholar 

  3. Aviv, A.J., Gibson, K.L., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. Woot 10, 1–7 (2010)

    Google Scholar 

  4. Aviv, A.J., Prak, J.L.: Comparisons of data collection methods for android graphical pattern unlock. In: SOUPS 2015. USENIX Association, Ottawa (2015)

    Google Scholar 

  5. Bier, A., Sroczynski, Z.: Evaluation of pattern lock codes strength for increased security in mobile applications. In: Rostanski, M., Pikiewicz, P., Buchwald, P., Maczka, K. (eds.) Proceedings of the 11th Scientific Conference Internet in the Information Society 2016. Academy of Business in Dabrowa Gornicza Press, Dąbrowa Górnicza (2016)

    Google Scholar 

  6. Budzitowski, D., Aviv, A.J., Kuber, R.: Do bigger grid sizes mean better passwords? \(3\times 3\) vs. \(4\times 4\) grid sizes for android unlock patterns. In: SOUPS 2015. USENIX Association, Ottawa (2015)

    Google Scholar 

  7. Cao, K., Jain, A.K.: Hacking mobile phones using 2D printed fingerprints. MSU Technical report, MSU-CSE-16-2 (2016)

    Google Scholar 

  8. Cejudo-Torres-Orozco, M., Garcia-Rios, E., Escamillahernandez, E., Nakano-Miyatake, M., Perez-Meana, H.: Counterfeit image detection in face recognition systems using stereo vision and optical flow methods. In: MCASE 2014. Council for Exceptional Children, Missoula (2014)

    Google Scholar 

  9. De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and I know it’s you!: implicit authentication based on touch screen patterns. In: SIGCHI 2012, pp. 987–996. ACM, Austin (2012)

    Google Scholar 

  10. Egelman, S., Jain, S., Portnoff, R.S., Liao, K., Consolvo, S., Wagner, D.: Are you ready to lock? In: SIGSAC 2014, pp. 750–761. ACM, Scottsdale (2014)

    Google Scholar 

  11. Goodin, D., Loge, M.: New data uncovers the surprising predictability of android lock patterns; tell me who you are, and I will tell you your lock pattern. http://arstechnica.com/security/2015/08/new-data-uncovers-the-surprising-predictability-of-android-lock-patterns/. Accessed 23 Feb 2017

  12. Kapczynski, A., Kasprowski, P., Kuzniacki, P.: User authentication based on behavioral patterns. Int. J. Comput. 6(1), 75–79 (2014)

    Google Scholar 

  13. Kapczynski, A., Sroczynski, Z.: Behavioral HCI-based user authentication. In: Rostanski, M., Pikiewicz, P., Buchwald, P. (eds.) Internet in the Information Society 2015. 10th International Conference Proceedings. Academy of Business in Dabrowa Gornicza Press, Dąbrowa Górnicza (2015)

    Google Scholar 

  14. Kwon, T., Na, S.: Tinylock: affordable defense against smudge attacks on smartphone pattern lock systems. Comput. Secur. 42, 137–150 (2014)

    Article  Google Scholar 

  15. Lee, J.D., Im, H.J., Kang, W.M., Park, J.H.: Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices. Math. Prob. Eng. 2014 (2014)

    Google Scholar 

  16. Siadati, H., Gupta, P., Smith, S., Memon, N., Ahamad, M.: Fortifying android patterns using persuasive security framework. In: UBICOMM 2015, p. 81. IARIA XPS Press, Nice (2015)

    Google Scholar 

  17. Song, Y., Cho, G., Oh, S., Kim, H., Huh, J.H.: On the effectiveness of pattern lock strength meters: measuring the strength of real world pattern locks. In: CHFCS 2015, pp. 2343–2352. ACM, Seoul (2015)

    Google Scholar 

  18. Sroczynski, Z.: Human-computer interaction on mobile devices with the FM application platform. In: Rostanski, M., Pikiewicz, P. (eds.) Internet in the Information Society. Insights on the Information Systems, Structures and Applications. Academy of Business in Dabrowa Gornicza Press, Dąbrowa Górnicza (2014)

    Google Scholar 

  19. Sun, C., Wang, Y., Zheng, J.: Dissecting pattern unlock: the effect of pattern strength meter on pattern selection. J. Inf. Secur. Appl. 19(4), 308–320 (2014)

    Google Scholar 

  20. Szczepanik, M., Jóźwiak, I.J., Jamka, T., Stasiński, K.: Security lock system for mobile devices based on fingerprint recognition algorithm. In: ISAT 2015, pp. 25–35. Springer, Szklarska Poreba (2016)

    Google Scholar 

  21. Uellenbeck, S., Dürmuth, M., Wolf, C., Holz, T.: Quantifying the security of graphical passwords: the case of android unlock patterns. In: SIGSAC 2013, pp. 161–172. ACM, Berlin (2013)

    Google Scholar 

  22. Von Zezschwitz, E., Dunphy, P., De Luca, A.: Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. In: MobileHCI 2013, pp. 261–270. ACM, Munich (2013)

    Google Scholar 

  23. Zargarzadeh, M., Maghooli, K.: A behavioral biometric authentication system based on memory game. Biosci., Biotechnol. Res. Asia 10(2), 781–787 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Agnieszka Bier .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Bier, A., Kapczyński, A., Sroczyński, Z. (2018). Pattern Lock Evaluation Framework for Mobile Devices: Human Perception of the Pattern Strength Measure. In: Gruca, A., Czachórski, T., Harezlak, K., Kozielski, S., Piotrowska, A. (eds) Man-Machine Interactions 5. ICMMI 2017. Advances in Intelligent Systems and Computing, vol 659. Springer, Cham. https://doi.org/10.1007/978-3-319-67792-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67792-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67791-0

  • Online ISBN: 978-3-319-67792-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics