Keypad against brute force attacks on smartphones

被引:12
|
作者
Kim, I. [1 ]
机构
[1] Soongsil Univ, Sch Comp Sci & Engn, Seoul 156743, South Korea
关键词
RECOGNITION;
D O I
10.1049/iet-ifs.2010.0212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the powerful functions of smartphones provide much convenience for users, it causes a great damage because of loss and theft. Therefore the user has to use the phone lock provided by the smartphone. With the phone lock, the user is able to secure the time for requesting to stop the call service to the mobile telecommunication company and deleting the sensitive information with an anti-theft programme. However, the fixed keypad lock can be easily unlocked by brute force attacks and the pattern lock is vulnerable to smudge attacks. In this study, we propose a keypad for making brute force attacks and smudge attacks taking place on smartphones more difficult. The proposed keypad increases the time it takes for brute force attacks and is safe to smudge attacks. The smartphone equipped with the proposed keypad increases the time required for brute force attacks by the finder through formation of random buttons, random button arrangement and display delay time. Consequently, the smartphone owners are able to secure more time to become aware of the loss or theft and take action.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 50 条
  • [1] Privacy Against Brute-Force Inference Attacks
    Osia, Seyed Ali
    Rassouli, Borzoo
    Haddadi, Hamed
    Rabiee, Hamid R.
    Gunduz, Deniz
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 637 - 641
  • [2] GenoGuard: Protecting Genomic Data against Brute-Force Attacks
    Huang, Zhicong
    Ayday, Erman
    Fellay, Jacques
    Hubaux, Jean-Pierre
    Juels, Ari
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 447 - 462
  • [3] Lightweight protection against brute force login attacks on web applications
    Adams, Carlisle
    Jourdan, Guy-Vincent
    Levac, Jean-Pierre
    Prevost, Francois
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 181 - 188
  • [4] Brute force attacks on hash functions
    Laccetti, G.
    Schmid, G.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (03): : 439 - 460
  • [5] AN ALGORITHM FOR GENERATING DIGITAL WATERMARKS ROBUST AGAINST BRUTE-FORCE ATTACKS
    Mitekin, V. A.
    [J]. COMPUTER OPTICS, 2015, 39 (05) : 808 - 817
  • [6] A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
    Byun, Hyeonsu
    Kim, Jueun
    Jeong, Yunseok
    Seok, Byoungjin
    Gong, Seonghyeon
    Lee, Changhoon
    [J]. ELECTRONICS, 2024, 13 (13)
  • [7] Resistance Against Brute-Force Attacks on Stateless Forwarding in Information Centric Networking
    Alzahrani, Bander A.
    Reed, Martin J.
    Vassilakis, Vassilios G.
    [J]. ELEVENTH 2015 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS, 2015, : 193 - 194
  • [8] An Efficient Cryptographic Scheme for Text Message Protection against Brute Force and Cryptanalytic Attacks
    Joshi, Abhishek
    Wazid, Mohammad
    Goudar, R. H.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 360 - 366
  • [9] Detecting Brute-Force Attacks on Cryptocurrency Wallets
    Kiktenko, E. O.
    Kudinov, M. A.
    Fedorov, A. K.
    [J]. BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2019, 2019, 373 : 232 - 242
  • [10] Realtime Risk Monitoring of SSH Brute Force Attacks
    Fahrnberger, Guenter
    [J]. INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 75 - 95