Home > Research > Datasets > Pattern Lock Data Set for NDSS'17 paper entitle...

Electronic data

  • Pattern_strength.pdf

    10 KB, PDF-document

    Audiovisual

    Available under license: CC BY

    Date added: 26/02/17

  • Readme.txt

    1 KB, text/plain

    Audiovisual

    Available under license: CC BY

    Date added: 26/02/17

  • Patterns.pdf

    232 KB, PDF-document

    Audiovisual

    Available under license: CC BY

    Date added: 26/02/17

View graph of relations

Pattern Lock Data Set for NDSS'17 paper entitled "Cracking Android Pattern Lock in Five Attempts"

Dataset

  • Guixin Ye (Contributor)
  • Zhanyong Tang (Contributor)
  • Dingyi Fang (Contributor)
  • Xiaojiang Chen (Contributor)
  • Zheng Wang (Creator)

Description

This repository includes the 120 patterns we used for the paper entitled “Cracking Android Pattern Lock in Five Attempts” published in The Network and Distributed System Security Symposium 2017 (NDSS'17).

[Files]
-Pattern_strength.pdf shows the strength (complex) score distribution of the 120 patterns. The strength score is calculated using equation 2 described in the paper.

-Patterns.pdf plots all the 120 patterns we collected from users.

Data files are embargoed until 26/02/2017.

[Reference]
Please refer to our paper when using the data set.
#bibtex citation:

@inproceedings{ndss17-android,
author = {Guixin Ye and
Zhanyong Tang and
and
Dingyi Fang
and
Xiaojiang Chen
and
KwangIn Kim
and
Ben Taylor
and
Zheng Wang
},
title = {Cracking Android Pattern Lock in Five Attempts},
booktitle = {The Network and Distributed System Security Symposium 2017 (NDSS'17)}
year = {2017},
}

[Acknowledgement]
This work was partly supported by the UK Engineering and Physical Sciences Research Council (EPSRC)
through grant agreements EP/M01567X/1(SANDeRs) and EP/M015793/1(DIVIDEND), and the National Natural Science
Foundation of China (NSFC) (Grant No. 61672427).
Date made available26/02/2017
PublisherLancaster University
Date of data production2016

Contact person

Relations