Keypad against brute force attacks on smartphones

被引:12
|
作者
Kim, I. [1 ]
机构
[1] Soongsil Univ, Sch Comp Sci & Engn, Seoul 156743, South Korea
关键词
RECOGNITION;
D O I
10.1049/iet-ifs.2010.0212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the powerful functions of smartphones provide much convenience for users, it causes a great damage because of loss and theft. Therefore the user has to use the phone lock provided by the smartphone. With the phone lock, the user is able to secure the time for requesting to stop the call service to the mobile telecommunication company and deleting the sensitive information with an anti-theft programme. However, the fixed keypad lock can be easily unlocked by brute force attacks and the pattern lock is vulnerable to smudge attacks. In this study, we propose a keypad for making brute force attacks and smudge attacks taking place on smartphones more difficult. The proposed keypad increases the time it takes for brute force attacks and is safe to smudge attacks. The smartphone equipped with the proposed keypad increases the time required for brute force attacks by the finder through formation of random buttons, random button arrangement and display delay time. Consequently, the smartphone owners are able to secure more time to become aware of the loss or theft and take action.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 50 条
  • [11] The effectiveness of brute force attacks on RC4
    Couture, N
    Kent, KB
    [J]. SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 333 - 336
  • [12] Detecting SSH and FTP Brute Force Attacks in Big Data
    Hancock, John
    Khoshgoftaar, Taghi M.
    Leevy, Joffrey L.
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 760 - 765
  • [13] Resilience against Brute Force and Rainbow Table Attacks using Strong ICMetrics Session Key Pairs
    Tahir, Ruhma
    Hu, Huosheng
    Gu, Dongbing
    McDonald-Maier, Klaus
    Howells, Gareth
    [J]. 2013 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS SIGNAL PROCESSING, AND THEIR APPLICATIONS (ICCSPA'13), 2013,
  • [14] Protecting financial institutions from brute-force attacks
    Herley, Cormac
    Florencio, Dinei
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 681 - 685
  • [15] Machine Learning for Detecting Brute Force Attacks at the Network Level
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Kemp, Clifford
    Seliya, Naeem
    Zuech, Richard
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOENGINEERING (BIBE), 2014, : 379 - 385
  • [16] A Flow-Level Taxonomy and Prevalence of Brute Force Attacks
    Vykopal, Jan
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 666 - 675
  • [17] Hidden Markov Model Modeling of SSH Brute-Force Attacks
    Sperotto, Anna
    Sadre, Ramin
    de Boer, Pieter-Tjerk
    Pras, Aiko
    [J]. INTEGRATED MANAGEMENT OF SYSTEMS, SERVICES, PROCESSES AND PEOPLE IN IT, PROCEEDINGS, 2009, 5841 : 164 - 176
  • [18] Relational data watermarking resilience to brute force attacks in untrusted environments
    Gort, Maikel Lazaro Perez
    Olliaro, Martina
    Cortesi, Agostino
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2023, 212
  • [19] A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
    Jo, Hyun-Ju
    Yoon, Ji Won
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [20] Research on techniques for detecting brute-force attacks on corporate email
    Liu, Xiaomei
    Hu, Xuewei
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2024, 24 (03) : 1379 - 1393