References
- Y. Abdelrahman, M. Khamis, S. Schneegass and F. Alt, "Stay cool! understanding thermal attacks on mobile-based user authentication," In Proc. of CHI 2017.
- P. Andriotis, T. Tryfonas, G. Oikonomou and C. Yildiz, "A pilot study on the security of pattern screen-lock methods and soft side channel attacks," In Proc. of Wisec 2016.
- A.J. Aviv, K.L Gibson, E. Mossop, M. Blaze, and J.M. Smith, "Smudge Attacks on Smartphone Touch Screen," In Proc. of WOOT 2010.
- R. Biddle, S. Chiasson, and P.C. Van Oorschot, "Graphical passwords: Learning from the first twelve years," In ACM Computing Surveys, Aug., 2012.
- H. Crawford and E. Ahmadzadeh, "Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics,"
- A. Das, J. Bonneau, M. Caesar, N. Borisov and X. Wang, "The Tangled Web of Password Reuse," In Proc. of NDSS 2014.
- A. De Luca, A. Hang, F. Brudy, C. Lindner and H. Hussmann, "Touch me once and I know it's you!: implicit authentication based on touch screen patterns," In Proc. of CHI 2012.
- A. De Luca, A. Hang, E. Von Zezschwitz, and H. Hussmann, "I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones," In Proc. of CHI 2015.
- S. Eberz, K.B. Rasmussen, V. Lenders and I. Martinovic, "Evaluating behavioral biometrics for continuous authentication: Challenges and metrics," In Proc. of ASIACCS 2017.
- M. Eiband, M. Khamis, E. von Zezschwitz, H. Hussmann and F. Alt, "Understanding shoulder surfing in the wild: Stories from users and observers," In Proc. of CHI 2017.
- L. Fridman, S. Weber, R. Greenstadt and M. Kam, "Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location," In IEEE Systems Journal, 2017.
- R.S. Gaines, W. Lisowski, S.J. Press and N. Shapiro, "Authentication by keystroke timing: Some preliminary results," Rand Report R-2526-NSF, Rand, Santa Monica, CA. 1980.
- M. Harbach, E. Von Zezschwitz, A. Fichtner, A. De Luca and M. Smith, "It's a hard lock life: A field study of smartphone (un) locking behavior and risk perception." In Proc. of SOUPS 2014.
- B. Ur, F. Noma, J. Bess, S. M. Segreti, R. Shay, L. Bauer, N. Christin, and L. F. Cranor, ""I added '!' at the End to Make It Secure": Oberving Password Creation in the Lab," In Proc. of SOUPS 2015.
- M. Khamis, M. Hassib, E.V. Zezschwitz, A. Bulling and F. Alt, "GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication," In Proc. of ICMI 2017.
- W. Kim, "Fingerprint Liveness Detection Using Local Coherence Patterns," In IEEE Signal Processing Letters, 2017.
- K. Krombholz, T. Hupperich and T. Holz, "Use the force: Evaluating force-sensitive authentication for mobile devices," In Proc. of SOUPS 2016.
- T. Kwon and S. Na, "TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems," In computers & security, May, 2014.
- H. Lee, S. Kim, and T. Kwon, "Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones," In Proc. of ACSAC 2017.
- Y. Li, Y. Li, Q. Yan, H. Kong and R.H. Deng, "Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication," In Proc. of ACM CCS 2015.
- A. Mahfouz, T.M. Mahmoud and A.S. Eldin, "A survey on behavioral biometric authentication on smartphones," In Journal of Information Security and Applications, 2017.
- Y. Song, G. Cho, S. Oh, H. Kim, J.H. Huh, "On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks. In Proc. of CHI 2015.
- H. Xu, Y. Zhou, M.R. Lyu, "Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones," In Proc. of SOUPS 2014.
- Ten-Year-Old's Face Unlocks Face ID on His Mom's iPhone X : https://youtu.be/dUMH6DVYskc
- The Global biometrics and Mobility Report: http://www.acuity-mi.com/GBMR_Report.php
- Behaviosec: https://www.behaviosec.com
- UnifyID: https://unify.id/