Abstract
In this paper we present a multiplatform research framework for acquisition of pattern locks and evaluation of their strength. Along with the design features of the framework itself we provide the analysis of the data set of more than 300 pattern locks acquired by means of this solution. In particular we compare the subjective human rating of pattern memorizability and complexity with the numerical values of pattern strength measure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: WISEC 2013, pp. 1–6. ACM, Budapest (2013)
Aviv, A.J., Fichter, D.: Understanding visual perceptions of usability and security of android’s graphical password pattern. In: CSAC 2014, pp. 286–295. ACM, New Orleans (2014)
Aviv, A.J., Gibson, K.L., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. Woot 10, 1–7 (2010)
Aviv, A.J., Prak, J.L.: Comparisons of data collection methods for android graphical pattern unlock. In: SOUPS 2015. USENIX Association, Ottawa (2015)
Bier, A., Sroczynski, Z.: Evaluation of pattern lock codes strength for increased security in mobile applications. In: Rostanski, M., Pikiewicz, P., Buchwald, P., Maczka, K. (eds.) Proceedings of the 11th Scientific Conference Internet in the Information Society 2016. Academy of Business in Dabrowa Gornicza Press, Dąbrowa Górnicza (2016)
Budzitowski, D., Aviv, A.J., Kuber, R.: Do bigger grid sizes mean better passwords? \(3\times 3\) vs. \(4\times 4\) grid sizes for android unlock patterns. In: SOUPS 2015. USENIX Association, Ottawa (2015)
Cao, K., Jain, A.K.: Hacking mobile phones using 2D printed fingerprints. MSU Technical report, MSU-CSE-16-2 (2016)
Cejudo-Torres-Orozco, M., Garcia-Rios, E., Escamillahernandez, E., Nakano-Miyatake, M., Perez-Meana, H.: Counterfeit image detection in face recognition systems using stereo vision and optical flow methods. In: MCASE 2014. Council for Exceptional Children, Missoula (2014)
De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and I know it’s you!: implicit authentication based on touch screen patterns. In: SIGCHI 2012, pp. 987–996. ACM, Austin (2012)
Egelman, S., Jain, S., Portnoff, R.S., Liao, K., Consolvo, S., Wagner, D.: Are you ready to lock? In: SIGSAC 2014, pp. 750–761. ACM, Scottsdale (2014)
Goodin, D., Loge, M.: New data uncovers the surprising predictability of android lock patterns; tell me who you are, and I will tell you your lock pattern. http://arstechnica.com/security/2015/08/new-data-uncovers-the-surprising-predictability-of-android-lock-patterns/. Accessed 23 Feb 2017
Kapczynski, A., Kasprowski, P., Kuzniacki, P.: User authentication based on behavioral patterns. Int. J. Comput. 6(1), 75–79 (2014)
Kapczynski, A., Sroczynski, Z.: Behavioral HCI-based user authentication. In: Rostanski, M., Pikiewicz, P., Buchwald, P. (eds.) Internet in the Information Society 2015. 10th International Conference Proceedings. Academy of Business in Dabrowa Gornicza Press, Dąbrowa Górnicza (2015)
Kwon, T., Na, S.: Tinylock: affordable defense against smudge attacks on smartphone pattern lock systems. Comput. Secur. 42, 137–150 (2014)
Lee, J.D., Im, H.J., Kang, W.M., Park, J.H.: Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices. Math. Prob. Eng. 2014 (2014)
Siadati, H., Gupta, P., Smith, S., Memon, N., Ahamad, M.: Fortifying android patterns using persuasive security framework. In: UBICOMM 2015, p. 81. IARIA XPS Press, Nice (2015)
Song, Y., Cho, G., Oh, S., Kim, H., Huh, J.H.: On the effectiveness of pattern lock strength meters: measuring the strength of real world pattern locks. In: CHFCS 2015, pp. 2343–2352. ACM, Seoul (2015)
Sroczynski, Z.: Human-computer interaction on mobile devices with the FM application platform. In: Rostanski, M., Pikiewicz, P. (eds.) Internet in the Information Society. Insights on the Information Systems, Structures and Applications. Academy of Business in Dabrowa Gornicza Press, Dąbrowa Górnicza (2014)
Sun, C., Wang, Y., Zheng, J.: Dissecting pattern unlock: the effect of pattern strength meter on pattern selection. J. Inf. Secur. Appl. 19(4), 308–320 (2014)
Szczepanik, M., Jóźwiak, I.J., Jamka, T., Stasiński, K.: Security lock system for mobile devices based on fingerprint recognition algorithm. In: ISAT 2015, pp. 25–35. Springer, Szklarska Poreba (2016)
Uellenbeck, S., Dürmuth, M., Wolf, C., Holz, T.: Quantifying the security of graphical passwords: the case of android unlock patterns. In: SIGSAC 2013, pp. 161–172. ACM, Berlin (2013)
Von Zezschwitz, E., Dunphy, P., De Luca, A.: Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. In: MobileHCI 2013, pp. 261–270. ACM, Munich (2013)
Zargarzadeh, M., Maghooli, K.: A behavioral biometric authentication system based on memory game. Biosci., Biotechnol. Res. Asia 10(2), 781–787 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Bier, A., Kapczyński, A., Sroczyński, Z. (2018). Pattern Lock Evaluation Framework for Mobile Devices: Human Perception of the Pattern Strength Measure. In: Gruca, A., Czachórski, T., Harezlak, K., Kozielski, S., Piotrowska, A. (eds) Man-Machine Interactions 5. ICMMI 2017. Advances in Intelligent Systems and Computing, vol 659. Springer, Cham. https://doi.org/10.1007/978-3-319-67792-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-67792-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67791-0
Online ISBN: 978-3-319-67792-7
eBook Packages: EngineeringEngineering (R0)