计算机科学 ›› 2015, Vol. 42 ›› Issue (Z11): 364-367.
吴继杰,曹天杰,翟靖轩
WU Ji-jie, CAO Tian-jie and ZHAI Jing-xuan
摘要: 现阶段,越来越多的智能手机使用图案锁作为身份认证机制。为解锁智能手机,用户需要将解锁图案绘制在屏幕上,这样就不可避免地留下油性残留物,又称污迹。敌手可以利用污迹重现解锁图案,使用户的隐私受到威胁。通过对现有图案锁的研究,提出了一种能在衣服口袋中进行解锁的系统:BlindLock图案锁系统。BlindLock图案锁利用覆盖原理抵抗污迹攻击,同时利用视觉闭塞原理抵抗肩窥攻击。用户研究表明:BlindLock可在不改变原有图形记忆方式和增加最少解锁时间的情况下显著提升系统安全性、可用性和密码空间。
[1] Suo X,Zhu Y,Owen G S.Analysis and design of graphical password techniques[M]∥Advances in Visual Computing.Springer Berlin Heidelberg,2006:741-749 [2] Suo X,Zhu Y,Owen G S.Graphical passwords:A survey[C]∥21st Annual Computer Security Applications Conference.IEEE,2005:472 [3] Aviv A J,Gibson K,Mossop E,et al.Smudge attacks on smartphone touch screens[C]∥Proceedings of the 4th USENIX Conference on Offensive Technologies.USENIX Association,2010:1-7 [4] Von Zezschwitz E,Koslow A,De Luca A,et al.Making graphic-based authentication secure against smudge attacks[C]∥Proceedings of the 2013 International Conference on Intelligent user Interfaces.ACM,2013:277-286 [5] Kim S,Yi H,Yi J H.FakePIN:Dummy Key Based Mobile User Authentication Scheme[M]∥Ubiquitous Information Technologies and Applications.Springer Berlin Heidelberg,2014:157-164 [6] Kim H W,Kang A,Barolli L,et al.Efficient locking schemewith OPOF on smart devices[M]∥Advances in Computer Science and its Applications.Springer Berlin Heidelberg,2014:369-378 [7] Andriotis P,Tryfonas T,Oikonomou G,et al.A pilot study on the security of pattern screen-lock methods and soft side channel attacks[C]∥Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks.ACM,2013:1-6 [8] Airowaily K,Alrubaian M.Oily residuals security threat on smart phones[C]∥2011 First International Conferenceon Robot,Vision and Signal Processing(RVSP).IEEE,2011:300-302 [9] Tari F,Ozok A,Holden S H.A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords[C]∥Proceedings of the Second Symposium on Usable Privacy and Security.ACM,2006:56-66 [10] Schaub F,Deyhle R,Weber M.Password entry usability andshoulder surfing susceptibility on different smartphone platforms[C]∥Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia.ACM,2012:13 [11] Wu T S,Lee M L,Lin H Y,et al.Shoulder-surfing-proof graphi-cal password authentication scheme[J].International journal of information security,2014,13(3):245-254 [12] Chakraborty N,Mondal S.SLASS:Secure login against shoulder surfing[M]∥Recent Trends in Computer Networks and Distributed Systems Security.Springer Berlin Heidelberg,2014:346-357 [13] Hirotaka N.Reassessing current cell phone designs:usingthumb input effectively[C]∥Extended Abstracts on Human Factors in Computing Systems(CHI’03).ACM,2003:938-939 [14] Jermyn I,Mayer A,Monrose F,et al.The design and analysis of graphical passwords[C]∥Proceedings of the 8th USENIX Security Symposium.1999:1 [15] Wiedenbeck S,Waters J,Birget J C,et al.PassPoints:Design and longitudinal evaluation of a graphical password system[J].International Journal of Human-Computer Studies,2005,63(1):102-127 [16] Bicakci K,Atalay N B,Yuceel M,et al.Towards usable solutions to graphical password hotspot problem[C]∥33rd Annual IEEE International Computer Software and Applications Conference,2009(COMPSAC’09).IEEE,2009:318-323 |
No related articles found! |
|