Towards baselines for shoulder surfing on mobile authentication
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017•dl.acm.org
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime
target for credential leaking via shoulder surfing, a form of an observation attack. While the
research community has investigated solutions to minimize or prevent the threat of shoulder
surfing, our understanding of how the attack performs on current systems is less well
studied. In this paper, we describe a large online experiment (n= 1173) that works towards
establishing a baseline of shoulder surfing vulnerability for current unlock authentication …
target for credential leaking via shoulder surfing, a form of an observation attack. While the
research community has investigated solutions to minimize or prevent the threat of shoulder
surfing, our understanding of how the attack performs on current systems is less well
studied. In this paper, we describe a large online experiment (n= 1173) that works towards
establishing a baseline of shoulder surfing vulnerability for current unlock authentication …
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the research community has investigated solutions to minimize or prevent the threat of shoulder surfing, our understanding of how the attack performs on current systems is less well studied. In this paper, we describe a large online experiment (n = 1173) that works towards establishing a baseline of shoulder surfing vulnerability for current unlock authentication systems. Using controlled video recordings of a victim entering in a set of 4- and 6-length PINs and Android unlock patterns on different phones from different angles, we asked participants to act as attackers, trying to determine the authentication input based on the observation. We find that 6-digit PINs are the most elusive attacking surface where a single observation leads to just 10.8% successful attacks (26.5% with multiple observations). As a comparison, 6-length Android patterns, with one observation, were found to have an attack rate of 64.2% (79.9% with multiple observations). Removing feedback lines for patterns improves security to 35.3% (52.1% with multiple observations). This evidence, as well as other results related to hand position, phone size, and observation angle, suggests the best and worst case scenarios related to shoulder surfing vulnerability which can both help inform users to improve their security choices, as well as establish baselines for researchers.
ACM Digital Library
Showing the best result for this search. See all results