skip to main content
10.1145/2702123.2702202acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
note

Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns

Published:18 April 2015Publication History

ABSTRACT

We performed a systematic evaluation of the shoulder surfing susceptibility of the Android pattern (un)lock. The results of an online study (n=298) enabled us to quantify the influence of pattern length, line visibility, number of knight moves, number of overlaps and number of intersections on observation resistance. The results show that all parameters have a highly significant influence, with line visibility and pattern length being most important. We discuss implications for real-world patterns and present a linear regression model that can predict the observability of a given pattern. The model can be used to provide proactive security measurements for (un)lock patterns, in analogy to password meters.

References

  1. Andriotis, P., Tryfonas, T., and Oikonomou, G. Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In Col. HAS'14, vol. 8533 of Lecture Notes in Computer Science. Springer International Publishing, 2014, 115--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. WOOT 10 (2010), 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. De Luca, A., Hang, A., Brudy, F., Lindner, C., and Hussmann, H. Touch me once and i know it's you!: implicit authentication based on touch screen patterns. In Proc. CHI '12, ACM (New York, NY, USA, 2012), 987--996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., and Smith, M. It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception. In Proc. SOUPS '14, USENIX Association (Menlo Park, CA, July 2014), 213--230.Google ScholarGoogle Scholar
  5. Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., and Rubin, A. D. The design and analysis of graphical passwords. In Proc. SSYM'99, USENIX Association (Berkeley, CA, USA, 1999), 1--1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Uellenbeck, S., Dürmuth, M., Wolf, C., and Holz, T. Quantifying the security of graphical passwords: The case of android unlock patterns. In Proc. CCS '13, ACM (New York, NY, USA, 2013), 161--172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. van Eekelen, W., van den Elst, J., and Khan, V.-J. Dynamic layering graphical elements for graphical password schemes. Creating the Difference (2014), 65.Google ScholarGoogle Scholar
  8. von Zezschwitz, E., Dunphy, P., and De Luca, A. Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. In Proc. MobileHCI '13, ACM (New York, NY, USA, 2013), 261--270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zakaria, N. H., Griffiths, D., Brostoff, S., and Yan, J. Shoulder surfing defence for recall-based graphical passwords. In Proc. SOUPS '11, ACM (New York, NY, USA, 2011), 6:1--6:12. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
      April 2015
      4290 pages
      ISBN:9781450331456
      DOI:10.1145/2702123

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 April 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • note

      Acceptance Rates

      CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader