Acknowledgement
This study was supported by research fund from Chosun University, 2022.
References
- https://blog.uplus.co.kr/2149
- https://cjh38.tistory.com/entry/%EC%B5%9C%EC%B4%88%EC%9D%98-%EC%8A%A4%EB%A7%88%ED%8A%B8%ED%8F%B0-%EC%8A%A4%EB%A7%88%ED%8A%B8%ED%8F%B0%EC%9D%98-%EC%97%AD%EC%82%AC-%EB%B3%80%EC%B2%9C%EC%82%AC
- Seung Hyeog Moon, "A Study on ICT Conversion and Change of Industrial Society", The Journal of the Convergence on Culture Technology (JCCT), Vol 7, No. 4, pp. 653-658, November, 2021. https://doi.org/10.17703/JCCT.2021.7.4.653
- Tae-Seung Ko, Byeong-Joo Kim, Jeong-Woo Jwa,"Development of wearable devices and mobile apps for fall detection and health management" International Journal of Advanced Culture Technology, Vol. 11, No. 1, pp. 370-375, 2023. https://doi.org/10.17703/IJACT.2023.11.1.370
- https://infogalactic.com/info/Form_factor_(mobile_phones)
- https://spectrum.ieee.org/consumerelectronics/portable-devices/from-foldablephones-to-stretchy-screens
- https://www.infopulse.com/blog/how-to-enable-secure-authentication-in-mobile-applications/
- C. Wang, Y. Wang, Y. Chen, H. Liu & J. Liu., "User authentication on mobile devices: Approaches, threats and trends," Computer Networks, Vol. 120, No. 7, pp. 107118, DOI : 10.1016/j.comnet.2020.107118
- E. Miluzzo, A. Varshavsky, S. Balakrishnan & R.R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints," Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323-336, Low Wood Bay : ACM. DOI : 10.1145/2307636.2307666
- T. Takada, "Fake Pointer: An Authentication Scheme for Improving Security against Peeping Attacks using Video Cameras," Proceeding of International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 395-400, Valencia : IARIA. DOI : 10.1109/UBICOMM.2008.76
- A.J. Aviv, K. Gibson, E. Mossop, M. Blaze & J.M. Smith, "Smudge Attacks on Smartphone Touch Screens," Proceeding of the 4th USENIX Conference on Offensive Technologies, pp. 1-7, Washington : ACM.
- Y. Abdelrahman, M. Khamis, S. Schneegass & F. Alt, "Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication," Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751-3763, Denver : ACM. DOI : 10.1145/3025453.3025461
- Cai,L.and Chen H., "Touch Logger:inferring keystrokes on touch screen from smartphone motion," Proceedings of the 6th USENIX Workshop on Hot Topics in Security, pp. 9-9, 2011.
- Dongmin Choi, " A Study on the Correlation between Atypical Form Factor-based Smartphones and Display-dependent Authentication Methods," Journal of Korea Multimedia Society, Vol. 24, No. 8, pp. 1076-1089 August 2021. https://doi.org/10.9717/kmms.2021.24.8.1076
- https://pc-solucion.es/terminos/shoulder-surfing/
- Paul Bekaert, Norah Alotaibi, Florian Mathis, Nina Gerber, Aidan Christopher Rafferty, Mohamed Khamis, and Karola Marky."Are Thermal Attacks a Realistic Threat? Investigating the Preconditions of Thermal Attacks in Users' Daily Lives," In Nordic Human-Computer Interaction Conference (NordiCHI '22), October 8-12, 2022, Aarhus, Denmark. ACM, New York, NY, USA pp. 1-9. https://doi.org/10.1145/3546155.3546706
- Do Kyung Kim, Chang Kuk You, "Analysis of Mobile Product Design Applying Stretchable Display(SD) -focused on the expansionary application design structure for 2030 new-media-generation in mobile environment-," vol. 24, no. 2, pp. 33-45, April 2023. DOI : 10.47294/KSBDA.24.2.3