CRASH - Cued Recall Authentication resistant to Shoulder Surfing attack

被引:0
|
作者
Sruthi, P., V [1 ]
机构
[1] Cochin Coll Engn & Technol, Dept Comp Sci & Engn, Malappuram, Kerala, India
关键词
authentication; shoulder surfing attack; graphical passwords; usable security;
D O I
暂无
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
This paper presents an integrated evaluation of the new Shoulder Surfing resistant Cued Recall authentication, including usability and security evaluations, and implementation considerations. In public places, users may be at a risk of attackers stealing their passwords. Capturing the password by direct observation or recording the individual authentication session is called Shoulder surfing attack. Most of the currently designed graphical passwords are vulnerable to shoulder Surfing attack. This paper reports the design and evaluation of the Cued Click Point Graphical Password with a Shoulder Surfing defense feature.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System
    Li, Na
    Wu, Qianhong
    Liu, Jingwen
    Hu, Wei
    Qin, Bo
    Wu, Wei
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 435 - 453
  • [22] Towards Baselines for Shoulder Surfing on Mobile Authentication
    Aviv, Adam J.
    Davin, John T.
    Wolf, Flynn
    Kuber, Ravi
    [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 486 - 498
  • [23] An association-based graphical password design resistant to shoulder-surfing attack
    Li, Z
    Sun, QB
    Lian, Y
    Giusto, DD
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 245 - 248
  • [24] Usability Comparison of Over-the-Shoulder Attack Resistant Authentication Schemes
    Cain, Ashley A.
    Still, Jeremiah D.
    [J]. JOURNAL OF USABILITY STUDIES, 2018, 13 (04) : 196 - 219
  • [25] PassNeighbor: A Shoulder Surfing Resistant Scheme
    Saeed, Swaleha
    Umar, M. Sarosh
    [J]. PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 797 - 802
  • [26] Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol
    Khedr, Walid I.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 39 : 41 - 57
  • [27] Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones
    Higashiyama, Yuma
    Yanai, Naoto
    Okamura, Shingo
    Fujiwara, Toru
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 89 - 95
  • [28] Operation Code Authentication Preventing Shoulder Surfing Attacks
    Naqvi, Syed Shabih ul Hasan
    Afzal, Samiullah
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 32 - 35
  • [29] A shoulder-surfing resistant image-based authentication scheme with a brain-computer interface
    Gondesen, Florian
    Marx, Matthias
    Kycler, Ann-Christine
    [J]. 2019 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2019, : 336 - 343
  • [30] An Access Control Resistant to Shoulder-Surfing
    Jang, Jae-Jin
    Jung, Im Y.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 196 - 196