메뉴 건너뛰기




Volumn 5, Issue 3, 2010, Pages 393-405

Purely automated attacks on PassPoints-style graphical passwords

Author keywords

Algorithms; computer security; graphical user interfaces; human factors; image processing; machine vision

Indexed keywords

AUTOMATED ATTACKS; COMPUTATIONAL MODEL; COMPUTER SECURITY; DATA SETS; FOCUS OF ATTENTION; GRAPH-BASED ALGORITHMS; GRAPHICAL PASSWORD; HUMAN FACTORS; MACHINE VISION; MULTIPLE IMAGE; PASS POINT; VISUAL ATTENTION;

EID: 77955677817     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2053706     Document Type: Article
Times cited : (71)

References (38)
  • 3
    • 70350567265 scopus 로고    scopus 로고
    • User interface design affects security: Patterns in click-based graphical passwords
    • S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, "User interface design affects security: Patterns in click-based graphical passwords," Int. J. Inf. Security, vol.8, no.6, pp. 387-398, 2009.
    • (2009) Int. J. Inf. Security , vol.8 , Issue.6 , pp. 387-398
    • Chiasson, S.1    Forget, A.2    Biddle, R.3    Van Oorschot, P.C.4
  • 7
    • 0036565814 scopus 로고    scopus 로고
    • Mean shift: A robust approach toward feature space analysis
    • May
    • D. Comaniciu and P. Meer, "Mean shift: A robust approach toward feature space analysis," IEEE Trans. Patten Analy. Mach. Intell., vol.24, no.5, pp. 603-619, May 2002.
    • (2002) IEEE Trans. Patten Analy. Mach. Intell , vol.24 , Issue.5 , pp. 603-619
    • Comaniciu, D.1    Meer, P.2
  • 8
    • 84981263306 scopus 로고    scopus 로고
    • The magical number 4 in short-term memory: A reconsideration of mental storage capacity
    • N. Cowan, "The magical number 4 in short-term memory: A reconsideration of mental storage capacity," Behavioral Brain Sci., vol.24, pp. 87-185, 2000.
    • (2000) Behavioral Brain Sci , vol.24 , pp. 87-185
    • Cowan, N.1
  • 14
    • 77955688821 scopus 로고    scopus 로고
    • Reproduced by Permission of, [Online]. Available
    • Ian Britton (Reproduced by Permission of). Image Ref: 21-35-43 [Online]. Available: http://www.freefoto.com
    • Image Ref 21-35-43
    • Britton, I.1
  • 15
    • 0035286497 scopus 로고    scopus 로고
    • Computational modeling of visual attention
    • Mar.
    • L. Itti and C. Koch, "Computational modeling of visual attention," Nature Rev. Neurosci., vol.2, no.3, pp. 194-203, Mar. 2001.
    • (2001) Nature Rev. Neurosci , vol.2 , Issue.3 , pp. 194-203
    • Itti, L.1    Koch, C.2
  • 16
    • 0032204063 scopus 로고    scopus 로고
    • A model of saliency-based visual attention for rapid scene analysis
    • Nov.
    • L. Itti, C.Koch, and E. Niebur, "A model of saliency-based visual attention for rapid scene analysis," IEEE Trans. Pattern Anal. Mach. Intell., vol.20, no.11, pp. 1254-1259, Nov. 1998.
    • (1998) IEEE Trans. Pattern Anal. Mach. Intell , vol.20 , Issue.11 , pp. 1254-1259
    • Itti, L.1    Koch, C.2    Niebur, E.3
  • 19
    • 84955153370 scopus 로고
    • Picture Memory
    • J C. Yuille, Ed. NJ: Lawrence Erlbaum Assoc.
    • S. Madigan, "Picture Memory," in Imagery, Memory and Cognition, J. C. Yuille, Ed. NJ: Lawrence Erlbaum Assoc., 1983, pp. 65-89.
    • (1983) Imagery, Memory and Cognition , pp. 65-89
    • Madigan, S.1
  • 20
    • 35348895703 scopus 로고    scopus 로고
    • Pictures at the ATM: Exploring the usability of multiple graphical passwords
    • New York, ACM Press
    • W. Moncur and G. Leplâtre, "Pictures at the ATM: Exploring the usability of multiple graphical passwords," in Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI'07), New York, 2007, pp. 887-894, ACM Press.
    • (2007) Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI'07) , pp. 887-894
    • Moncur, W.1    Leplâtre, G.2
  • 21
    • 39149113346 scopus 로고    scopus 로고
    • Graphical Passwords
    • L. Cranor and S. Garfinkel, Eds. Cambridge, MA: O'Reilly, ch.9
    • F. Monrose and M. K. Reiter, "Graphical Passwords," in Security and Usability, L. Cranor and S. Garfinkel, Eds. Cambridge, MA: O'Reilly, 2005, ch. 9, pp. 147-164.
    • (2005) Security and Usability , pp. 147-164
    • Monrose, F.1    Reiter, M.K.2
  • 22
    • 9644289372 scopus 로고    scopus 로고
    • Modeling the influence of task on attention
    • V. Navalpakkam and L. Itti, "Modeling the influence of task on attention," Vison Res., vol.45, pp. 205-231, 2005.
    • (2005) Vison Res , vol.45 , pp. 205-231
    • Navalpakkam, V.1    Itti, L.2
  • 23
    • 4243110339 scopus 로고    scopus 로고
    • Top down control of visual attention in object detection
    • A. Oliva, A. Torralba, M. Castelhano, and J. Henderson, "Top down control of visual attention in object detection," J. Vision, vol.3, no.9, pp. 253-256, 2003.
    • (2003) J. Vision , vol.3 , Issue.9 , pp. 253-256
    • Oliva, A.1    Torralba, A.2    Castelhano, M.3    Henderson, J.4
  • 25
    • 77955697974 scopus 로고    scopus 로고
    • Passlogix Feb. 2, [Online]. Available
    • Passlogix Feb. 2, 2007 [Online]. Available: http://www.passlogix.com
    • (2007)
  • 26
    • 77955688017 scopus 로고    scopus 로고
    • Guidelines for designing graphical authentication mechanism interfaces
    • K. Renaud, "Guidelines for designing graphical authentication mechanism interfaces.," Int. J. Inf. Comput. Security, vol.3, no.1, pp. 60-85, 2009.
    • (2009) Int. J. Inf. Comput. Security , vol.3 , Issue.1 , pp. 60-85
    • Renaud, K.1
  • 31
    • 85049042638 scopus 로고    scopus 로고
    • Human-seeded attacks and exploiting hot spots in graphical passwords
    • Boston, MA
    • J. Thorpe and P. C. van Oorschot, "Human-seeded attacks and exploiting hot spots in graphical passwords," in Proc. 16th USENIX Security Symp., Boston, MA, 2007.
    • (2007) Proc. 16th USENIX Security Symp.
    • Thorpe, J.1    Van Oorschot, P.C.2
  • 33
    • 39149106769 scopus 로고    scopus 로고
    • On predictive models and userdrawn graphical passwords
    • Jan.
    • P. C. van Oorschot and J. Thorpe, "On predictive models and userdrawn graphical passwords," ACM Trans. Inf. Syst. Security, vol.10, no.4, pp. 1-33, Jan. 2008.
    • (2008) ACM Trans. Inf. Syst. Security , vol.10 , Issue.4 , pp. 1-33
    • Van Oorschot, P.C.1    Thorpe, J.2
  • 34
    • 33750684017 scopus 로고    scopus 로고
    • Special Issue on Modeling Attention to Salient Proto-Objects
    • D. Walther and C. Koch, 2006 Special Issue on Modeling Attention to Salient Proto-Objects, Neural Netw., vol.19, no.9, pp. 1395-1407, 2006.
    • (2006) Neural Netw , vol.19 , Issue.9 , pp. 1395-1407
    • Walther, D.1    Koch, C.2
  • 38
    • 84864888849 scopus 로고
    • Guided search 2.0: A revised model of visual search
    • J. M. Wolfe, "Guided search 2.0: A revised model of visual search," Psychonomic Bull. Rev., vol.1, no.2, pp. 202-238, 1994.
    • (1994) Psychonomic Bull. Rev , vol.1 , Issue.2 , pp. 202-238
    • Wolfe, J.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.