Home > Research > Publications & Outputs > Back-of-Device authentication on smartphones

Links

Text available via DOI:

View graph of relations

Back-of-Device authentication on smartphones

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Back-of-Device authentication on smartphones. / De Luca, A.; Von Zezschwitz, E.; Nguyen, N.D.H. et al.
CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398. ACM, 2013. p. 2389-2398.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

De Luca, A, Von Zezschwitz, E, Nguyen, NDH, Maurer, M-E, Rubegni, E, Scipioni, MP & Langheinrich, M 2013, Back-of-Device authentication on smartphones. in CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398. ACM, pp. 2389-2398. https://doi.org/10.1145/2470654.2481330

APA

De Luca, A., Von Zezschwitz, E., Nguyen, N. D. H., Maurer, M-E., Rubegni, E., Scipioni, M. P., & Langheinrich, M. (2013). Back-of-Device authentication on smartphones. In CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398 (pp. 2389-2398). ACM. https://doi.org/10.1145/2470654.2481330

Vancouver

De Luca A, Von Zezschwitz E, Nguyen NDH, Maurer M-E, Rubegni E, Scipioni MP et al. Back-of-Device authentication on smartphones. In CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398. ACM. 2013. p. 2389-2398 doi: 10.1145/2470654.2481330

Author

De Luca, A. ; Von Zezschwitz, E. ; Nguyen, N.D.H. et al. / Back-of-Device authentication on smartphones. CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398. ACM, 2013. pp. 2389-2398

Bibtex

@inproceedings{24e5c74d938a492a8fca717922094ef2,
title = "Back-of-Device authentication on smartphones",
abstract = "This paper presents BoD Shapes, a novel authentication method for smartphones that uses the back of the device for input. We argue that this increases the resistance to shoulder surfing while remaining reasonably fast and easy-to-use. We performed a user study (n = 24) comparing BoD Shapes to PIN authentication, Android grid unlock, and a front version of our system. Testing a front version allowed us to directly compare performance and security measures between front and back authentication. Our results show that BoD Shapes is significantly more secure than the three other approaches. While performance declined, our results show that BoD Shapes can be very fast (up to 1.5 seconds in the user study) and that learning effects have an influence on its performance. This indicates that speed improvements can be expected in long-term use. Copyright 2013 ACM.",
keywords = "Authentication, Back of device interaction, Security, Authentication methods, Back of devices, Learning effects, Security measure, Shoulder surfing, Speed improvement, User study, Human engineering, Smartphones, Human computer interaction",
author = "{De Luca}, A. and {Von Zezschwitz}, E. and N.D.H. Nguyen and M.-E. Maurer and E. Rubegni and M.P. Scipioni and M. Langheinrich",
year = "2013",
doi = "10.1145/2470654.2481330",
language = "English",
isbn = "9781450318990",
pages = "2389--2398",
booktitle = "CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398",
publisher = "ACM",

}

RIS

TY - GEN

T1 - Back-of-Device authentication on smartphones

AU - De Luca, A.

AU - Von Zezschwitz, E.

AU - Nguyen, N.D.H.

AU - Maurer, M.-E.

AU - Rubegni, E.

AU - Scipioni, M.P.

AU - Langheinrich, M.

PY - 2013

Y1 - 2013

N2 - This paper presents BoD Shapes, a novel authentication method for smartphones that uses the back of the device for input. We argue that this increases the resistance to shoulder surfing while remaining reasonably fast and easy-to-use. We performed a user study (n = 24) comparing BoD Shapes to PIN authentication, Android grid unlock, and a front version of our system. Testing a front version allowed us to directly compare performance and security measures between front and back authentication. Our results show that BoD Shapes is significantly more secure than the three other approaches. While performance declined, our results show that BoD Shapes can be very fast (up to 1.5 seconds in the user study) and that learning effects have an influence on its performance. This indicates that speed improvements can be expected in long-term use. Copyright 2013 ACM.

AB - This paper presents BoD Shapes, a novel authentication method for smartphones that uses the back of the device for input. We argue that this increases the resistance to shoulder surfing while remaining reasonably fast and easy-to-use. We performed a user study (n = 24) comparing BoD Shapes to PIN authentication, Android grid unlock, and a front version of our system. Testing a front version allowed us to directly compare performance and security measures between front and back authentication. Our results show that BoD Shapes is significantly more secure than the three other approaches. While performance declined, our results show that BoD Shapes can be very fast (up to 1.5 seconds in the user study) and that learning effects have an influence on its performance. This indicates that speed improvements can be expected in long-term use. Copyright 2013 ACM.

KW - Authentication

KW - Back of device interaction

KW - Security

KW - Authentication methods

KW - Back of devices

KW - Learning effects

KW - Security measure

KW - Shoulder surfing

KW - Speed improvement

KW - User study

KW - Human engineering

KW - Smartphones

KW - Human computer interaction

U2 - 10.1145/2470654.2481330

DO - 10.1145/2470654.2481330

M3 - Conference contribution/Paper

SN - 9781450318990

SP - 2389

EP - 2398

BT - CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398

PB - ACM

ER -