A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns

11/26/2018
by   Adam J. Aviv, et al.
0

Android's graphical password unlock remains one of the most widely used schemes for phone unlock authentication, and it is has been studied extensively in the last decade since its launch. We have learned that users' choice of patterns mimics the poor password choices in other systems, such as PIN or text-based passwords. A wide variety of analysis and data collections methods was used to reach these conclusions, but what is missing from the literature is a systemized comparison of the related work in this space that compares both the methodology and the results. In this paper, we take a detailed accounting of the different methods applied to data collection and analysis for Android unlock patterns. We do so in two dimensions. First we systemize prior work into a detailed taxonomy of collection methods, and in the second dimension, we perform a detailed analysis of 9 different data sets collected using different methods. While this study focuses singularly on the collection methods and comparisons of the Android pattern unlock scheme, we believe that many of the findings generalize to other graphical password schemes, unlock authentication technology, and other knowledge-based authentication schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/05/2020

Knock, Knock. Who's There? On the Security of LG's Knock Codes

Knock Codes are a knowledge-based unlock authentication scheme used on L...
research
04/04/2022

SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

The Android operating system is currently the most popular mobile operat...
research
12/09/2019

Force vs Nudge : Comparing Users Pattern Choices on SysPal and TinPal

Android's 3X3 graphical pattern lock scheme is one of the widely used au...
research
12/09/2019

Extended- Force vs Nudge : Comparing Users' Pattern Choices on SysPal and TinPal

Android's 3X3 graphical pattern lock scheme is one of the widely used au...
research
08/24/2020

Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns

Android unlock patterns remain quite common. Our study, as well as other...
research
09/13/2019

Supervised Learning for Physical Layer based Message Authentication in URLLC scenarios

PHYSEC based message authentication can, as an alternative to convention...
research
07/25/2022

Techniques for Continuous Touch-Based Authentication Modeling

The field of touch-based authentication has been rapidly developing over...

Please sign up or login with your details

Forgot password? Click here to reset