Talk:Smudge attack

Latest comment: 5 months ago by Truth protest in topic why did you mention blackberry

Wiki Education Foundation-supported course assignment

edit

  This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 September 2020 and 19 December 2020. Further details are available on the course page. Student editor(s): Hiiisparks. Peer reviewers: Jameswang323, Exploredragon, Madssnake, Bobalily, Plusoneplusone, Showtime oski, SpongebobSquarepants25, Lolabaylo, HanMiKC, Nicholas100000.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 03:37, 18 January 2022 (UTC)Reply

Bibliography

edit

Here is a bibliography I put together that can be used to add more information to the page! Hiiisparks (talk) 06:46, 18 October 2020 (UTC)Reply

1. Song, Yupeng, Zhongmin Cai, and Zhi-Li Zhang. 2017. "Multi-touch Authentication Using Hand Geometry and Behavioral Information," IEEE Symposium on Security and Privacy 357-372.

2. Ratha, N.K., J.H. Connell, and R.M. Bolle. 2001. “Enhancing Security and Privacy in Biometrics-based Authentication Systems.” IBM Systems Journal 40(3): 614-634.

3. Maqsood, Sana, Sonia Chiasson, and Audrey Girouard. 2016. “Bend Passwords: Using Gestures to Authenticate on Flexible Devices.” Personal and Ubiquitous Computing 20: 573–600.

4. Khan, Hassan, Urs Hengartner, and Daniel Vogel. 2020. “Mimicry Attacks on Smartphone Keystroke Authentication.” ACM Transactions on Privacy and Security 23(1): 1-34.

5. Mohamed Amine Ferrag et al. 2020. “Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.” Telecommunication Systems 73: 317–348.

6. Jang, Yun-Hwan and Yongsu Park. 2018. “Enhanced Knock Code Authentication with High Security and Improved Convenience.” KSII Transactions on Internet and Information Systems 12(9): 4560-4575.

7. Shen, Chao et al. 2016. "Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication." IEEE Transactions on Information Forensics and Security 11(3): 498-513.

8. Gupta, Haritabh et al. 2016. “Deciphering Text from Touchscreen Key Taps.” IFIP Annual Conference on Data and Applications Security and Privacy 9766: 3-18.

9. Serwadda, Abdul et al. 2016. “Toward Robotic Robbery on the Touch Screen.” ACM Transactions on Information and System Security 18(4): 1-25.

10. Cai, Liang and Hao Chen. 2012. “On the Practicality of Motion Based Keystroke Inference Attack.” International Conference on Trust and Trustworthy Computing 7344:273-290.

11. Tao, Hai and Carlisle Adams. 2007. “Pass: Go A Proposal to Improve the Usability of Graphical Passwords.” International Journal of Network Security 7(2): 273-292.

12. Oorschot, P.C. Van and Julie Thorpe. 2008. “On Predictive Models and User-Drawn Graphical Passwords.” ACM Transactions on Information and System Security 10(4): 1-33.

13. Jain, Anil K., Karthik Nandakumar, and Abhishek Nagar. 2013. “Fingerprint Template Protection: From Theory to Practice” Security and Privacy in Biometrics 187-214.

14. Yu, Xingjie et al. 2017. “EvoPass: Evolvable graphical password against shoulder-surfing attacks.” Computers and Security 70:179-198. 15. Shahzad, Muhammad, Alex X. Liu, and Arjmand Samuel. 2016. “Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures.” IEEE Transactions on Mobile Computing 16(10): 2726-2741.

16. Spreitzer, Raphael et. al. 2018. “Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices.” IEEE Communications Surveys & Tutorials 20(1): 465-488.

17. Khan, Razaullah et. al. 2020. “Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity.” Wireless Communications and Mobile Computing 2020: 1-18.

18. Zhao, Benjamin Zi Hao et al. 2020. “Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes.” ACM Transactions on Privacy and Security 24 (1): 1-32.

19. Shila, Devu Manikantan and Kunal Srivastava. 2018. "CASTRA: Seamless and Unobtrusive Authentication of Users to Diverse Mobile Services," IEEE Internet of Things Journal 5(5): 4042-4057.

20. Alzubaidi, Abdulaziz and Jugal Kalita. 2016. "Authentication of Smartphone Users Using Behavioral Biometrics," IEEE Communications Surveys & Tutorials 18 (3): 998-2026.

New Lead Section

edit

I added the Lead section from my sandbox, keeping a lot of the old lead and just adding more information. I also moved the couple of sentences that talked about the study conducted by UPenn to another section that I named "History" in my sandbox. This information will not be deleted, but just moved to the body of the article. Hiiisparks (talk) 07:26, 8 November 2020 (UTC)Reply

New Sections

edit

Added a History and Dangers of Smudge Attacks section to organize the lead a little bit. Hiiisparks (talk) 20:58, 16 November 2020 (UTC)Reply

why did you mention blackberry

edit

you didn't need to mention blackberry Truth protest (talk) 10:36, 17 June 2024 (UTC)Reply