User-Generated Free-Form Gestures for Authentication: Security and Memorability Michael Sherman*, Gradeigh Clark*, Yulong Yang*, Shridatt Sugrim*, Arttu Modig^, Janne Lindqvist*, Antti Oulasvirta+~, Teemu Roos^ *Rutgers University, +Max Planck Institute for Informatics, ~Saarland University, ^University of Helsinki Poster Presenter: Xianyi Gao − Rutgers University

ABSTRACT

RESULTS

This project studies the security and memorability of free-form multitouch gestures for mobile authentication [1].

Factors Affecting Security

• 63 participants generated free-form gestures, repeated them, and were later retested for memory. • We adapted a recent information theoretic metric for measuring the security and memorability of gestures. • We designed a practical multitouch gesture recognizer. • We evaluated the potential of free-form gestures against the shoulder-surfing attack. Factors Affecting Memorability

Recognizer Performance

MOTIVATION • Gestures can be performed faster than text-based passwords. • Traditional 3×3 grid authentication for Android is prone to attacks such as shoulder surfing and smudge attacks.

Shoulder Surfing Attack Trial

• Free-form multitouch gestures: No visual reference, allow multifingers, arbitrary shapes, scale and position invariant, and more difficult to attack

CONCLUSION • Results on security and memorability are favorable to free-form gestures for mobile authentication. • One-finger gestures had higher average mutual information than multi-fingers.

METHOD

• Gestures with many hard angles and turns had highest mutual information.

Evaluating Security of Gestures Using Information-Theoretic Metric [1]:

• The best-remembered gestures included signatures and simple angular shapes. More information available at: http://securegestures.org/

ACKNOWLEDGMENTS • Participants: session 1 (N=63, 24 males and 39 females) session 2 (N=57 returned) • Experiment Design: 17×2 mixed factor design (17 gesture repetitions with creations and recalls, 2 study sessions), second session is conducted at least 10 days after first session

This material is based upon work supported by the National Science Foundation under Grant Number 1228777. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

REFERENCE [1] Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, and Teemu Roos. 2014. User-generated free-form gestures for authentication: security and memorability. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services (MobiSys '14). ACM, New York, NY, USA, 176-189.

abstract conclusion results reference motivation method ...

Traditional 3×3 grid authentication for Android is prone to attacks such as shoulder ... Experiment Design: 17×2 mixed factor design (17 gesture repetitions with ...

771KB Sizes 1 Downloads 171 Views

Recommend Documents

Introduction Data Results Conclusion Methods
Large flares can be disruptive to technology on Earth. • Prediction is ... images? • We use this information to cluster the images ... This work was partially supported by NSF grant CCF-1217880 and a NSF Graduate Research. Fellowship to the ...

Abstract Experiments 1 & 2 Conclusion Introduction ...
Naturalness of lexical alternatives predicts time course of scalar ... Some utterances are underinformative: The onset and time course of scalar inferences. Journal of ... 3b 37 Click on men- tioned gumballs if statement cor- rect, on central button

methods abstract results discussion introduction ...
Research, Project Monitoring Unit, Project Directorate on Animal Disease ... availability, weak infrastructure, and unique cultural beliefs in India emphasize the.

abstract # 1785 methods conclusions purpose results ...
Metabolic Cart System (ParvoMedics, Salt Lake City, Utah ). Blood pressure and ratings of ... 2 x 2 x 2 mm. The baseline image was acquired without a diffusion gradient (b = 0). The remaining gradients were b = 1000s/mm2. Fractional anisotropy (FA) a

Abstract 1. Introduction A Simple Method for Estimating ...
Feb 24, 2004 - Lawless, Hu, and Cao (1995) present a method for the analysis of the important problem of estimation of survival rates from automobile warranty data when both time to failure and ..... intractable for analytical integration.

1. Introduction 2. Method 3. Results
The reconnection rate (electric eld at the X-Line) should also approach a constant value. Mass ux and reconnection rate are tracked to determine the state of the reconnection process. Attention is paid to the evolution of the current sheet structure.

Abstract
Location: Biogeografía de Medios Litorales: Dinámicas y conservación (2014), ISBN 978-84-617-. 1068-3, pages 185-188. Language: Spanish. Near the town of ...

Basis for Conclusion - ISA 560 (Redrafted) - IFAC
Dec 1, 2008 - (a) The firm and its personnel comply with professional standards and .... ED-ISA 220 and ED-ISQC 1 retained the definition of “firm” as per the ...

Beer's law conclusion questions.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Beer's law ...

of East Palaearctic: IV. (Conclusion)
of East Palaearctic: IV. (Conclusion) ...... nus Urophora R.-D. (Diptera, Tephritidae) of East Pa- laearctic: I. Key to Subgenera .... Europe, Tech. Bull. Commonw.

Literature Conclusion & Discussion Gait sensitivity ...
Hobbelen, D. G. E. and M. Wisse (2007). "A disturbance rejection measure for limit cycle walkers: The Gait Sensitivity Norm." IEEE Transactions on Robotics 23,. 1213-1224. Hobbelen, D.G.E.(2008) "Limit Cycle Walking", PhD Thesis, Delft University of.

Basis for Conclusion - ISA 560 (Redrafted) - IFAC
Dec 1, 2008 - FileDL.php?FID=4426. 2 .... the IFAC Code and ISA 220 (Redrafted) and ISQC 1 (Redrafted) in key definitions. The respondent also suggested ...

Writing Your Conclusion Big Fish.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Moral motivation
Keren's important insight here is that there is an important connection between moral ...... In light of her uncertainty regarding the permissibility of eating meat ...

1 Motivation
Mar 15, 2013 - support under research grant numbers P2005–0117:1 and W2006–0068:1. †Deakin University ... Telephone: +61 3 924 46973. Fax: +61 3 924.

abstract - GitHub
Terms of the work were reported and discussed on: 1. VII International scientific conference of graduate students, undergraduates, students of thermal engineering faculty of NTUU "KPI" (Kyiv, April 21-25, 2009). 2. VII International scientific confer

Motivation for Study
cutting energy use, using renewable energy sources, and pushing more sustainable .... See Table 1 for means and standard deviations for these four conditions.

2. Background 5. Conclusion 1. Introduction 3 ...
1. Introduction. With the advent of the photonic crystal a new concept in fiber optics called photonic crystal fiber. (PCF) has come to forefront in fiber research.