Keypad against brute force attacks on smartphones

被引:12
|
作者
Kim, I. [1 ]
机构
[1] Soongsil Univ, Sch Comp Sci & Engn, Seoul 156743, South Korea
关键词
RECOGNITION;
D O I
10.1049/iet-ifs.2010.0212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the powerful functions of smartphones provide much convenience for users, it causes a great damage because of loss and theft. Therefore the user has to use the phone lock provided by the smartphone. With the phone lock, the user is able to secure the time for requesting to stop the call service to the mobile telecommunication company and deleting the sensitive information with an anti-theft programme. However, the fixed keypad lock can be easily unlocked by brute force attacks and the pattern lock is vulnerable to smudge attacks. In this study, we propose a keypad for making brute force attacks and smudge attacks taking place on smartphones more difficult. The proposed keypad increases the time it takes for brute force attacks and is safe to smudge attacks. The smartphone equipped with the proposed keypad increases the time required for brute force attacks by the finder through formation of random buttons, random button arrangement and display delay time. Consequently, the smartphone owners are able to secure more time to become aware of the loss or theft and take action.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 50 条
  • [31] CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks
    Cao, Phuong M.
    Wu, Yuming
    Banerjee, Subho S.
    Azoff, Justin
    Withers, Alexander
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    [J]. PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2019, : 667 - 682
  • [32] Universal Randomized Guessing With Application to Asynchronous Decentralized Brute-Force Attacks
    Merhav, Neri
    Cohen, Asaf
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (01) : 114 - 129
  • [33] A Statistical Analysis of Large Passwords Lists, Used to Optimize Brute Force Attacks
    van Heerden, Renier Pelser
    Vorster, Johannes
    [J]. 4TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 111 - 128
  • [34] Universal Randomized Guessing with Application to Asynchronous Decentralized Brute-Force Attacks
    Merhav, Neri
    Cohen, Asaf
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 485 - 489
  • [35] Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
    Puthuparambil, Arun Babu
    Thomas, Jithin Jose
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [36] Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic
    Wichmann, Pascal
    Marx, Matthias
    Federrath, Hannes
    Fischer, Mathias
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [37] Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set
    Luxemburk, Jan
    Hynek, Karel
    Cejka, Tomas
    [J]. 2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 114 - 122
  • [38] Beyond Brute Force
    Kartoun, Uri
    [J]. COMMUNICATIONS OF THE ACM, 2017, 60 (10) : 8 - 8
  • [39] TOPASE: Detection of Brute Force Attacks used Disciplined IPs from IDS Log
    Honda, Satomi
    Unno, Yuki
    Maruhashi, Koji
    Takenaka, Masahiko
    Torii, Satoru
    [J]. PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1361 - 1364
  • [40] What's in a Name? Using Words' Uniqueness to Identify Hackers in Brute Force Attacks
    Rechavi, Amit
    Berenblum, Tamar
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2020, 14 (01): : 361 - 382