메뉴 건너뛰기




Volumn , Issue , 2013, Pages 291-304

ScreenPass: Secure password entry on touchscreen devices

Author keywords

OCR; Passwords; Phishing; Smartphone Security; User interface design; User study

Indexed keywords

PASSWORDS; PHISHING; SMARTPHONE SECURITIES; USER INTERFACE DESIGNS; USER STUDY;

EID: 84881187703     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2462456.2465425     Document Type: Conference Paper
Times cited : (22)

References (21)
  • 2
    • 80054837552 scopus 로고    scopus 로고
    • Falling asleep with angry birds, facebook and kindle: A large scale study on mobile application usage
    • M. Böhmer, B. Hecht, J. Schöning, A. Krüger, and G. Bauer. Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage. In MobileHCI, 2011.
    • (2011) MobileHCI
    • Böhmer, M.1    Hecht, B.2    Schöning, J.3    Krüger, A.4    Bauer, G.5
  • 3
    • 84970901426 scopus 로고    scopus 로고
    • TouchLogger: Inferring keystrokes on touch screen from smartphone motion
    • L. Cai and H. Chen. TouchLogger: inferring keystrokes on touch screen from smartphone motion. In HotSec, 2011.
    • (2011) HotSec
    • Cai, L.1    Chen, H.2
  • 5
    • 57649166927 scopus 로고    scopus 로고
    • You've been warned: An empirical study of the effectiveness of web browser phishing warnings
    • S. Egelman, L. F. Cranor, and J. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI, 2008.
    • (2008) CHI
    • Egelman, S.1    Cranor, L.F.2    Hong, J.3
  • 6
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information flow tracking system for realtime privacy monitoring on mobile phones
    • W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An information flow tracking system for realtime privacy monitoring on mobile phones. In OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Gon Chun, B.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 9
    • 33751538239 scopus 로고    scopus 로고
    • Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)
    • October
    • A. Y. Fu, L. Wenyin, and X. Deng. Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD). IEEE Transactions on Dependable and Secure Computing, 3, October 2006.
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3
    • Fu, A.Y.1    Wenyin, L.2    Deng, X.3
  • 11
    • 79961096636 scopus 로고    scopus 로고
    • DTA++: Dynamic taint analysis with targeted control-flow propagation
    • M. G. Kang, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic taint analysis with targeted control-flow propagation. In NDSS, 2011.
    • (2011) NDSS
    • Kang, M.G.1    McCamant, S.2    Poosankam, P.3    Song, D.4
  • 12
    • 85018519069 scopus 로고    scopus 로고
    • Safe passage for passwords and other sensitive data
    • J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS, 2009.
    • (2009) NDSS
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 13
    • 84860294696 scopus 로고    scopus 로고
    • ACCessory: Password inference using accelerometers on smartphones
    • E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. ACCessory: password inference using accelerometers on smartphones. In HotMobile, 2012.
    • (2012) HotMobile
    • Owusu, E.1    Han, J.2    Das, S.3    Perrig, A.4    Zhang, J.5
  • 14
    • 84867706703 scopus 로고    scopus 로고
    • Exploring iPhone usage: The influence of socioeconomic differences on smartphone adoption, usage and usability
    • A. Rahmati, C. Tossell, C. Shepard, P. Kortum, and L. Zhong. Exploring iPhone usage: the influence of socioeconomic differences on smartphone adoption, usage and usability. In MobileHCI, 2012.
    • (2012) MobileHCI
    • Rahmati, A.1    Tossell, C.2    Shepard, C.3    Kortum, P.4    Zhong, L.5
  • 17
    • 34548786769 scopus 로고    scopus 로고
    • Emperors new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. Emperors new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In IEEE Security and Privacy, 2007.
    • (2007) IEEE Security and Privacy
    • Schechter, S.E.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 18
    • 51149098551 scopus 로고    scopus 로고
    • An overview of the tesseract OCR engine
    • R. Smith. An overview of the Tesseract OCR engine. In ICDAR, 2007.
    • (2007) ICDAR
    • Smith, R.1
  • 19
    • 84857516359 scopus 로고    scopus 로고
    • Trust and protection in the illinois browser operating system
    • S. Tang, H. Mai, and S. T. King. Trust and protection in the Illinois browser operating system. In OSDI, 2010.
    • (2010) OSDI
    • Tang, S.1    Mai, H.2    King, S.T.3
  • 20
    • 33745867321 scopus 로고    scopus 로고
    • Do security toolbars actually prevent phishing attacks?
    • M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In CHI, 2006.
    • (2006) CHI
    • Wu, M.1    Miller, R.C.2    Garfinkel, S.L.3
  • 21
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In IEEE Security and Privacy, 2012.
    • (2012) IEEE Security and Privacy
    • Zhou, Y.1    Jiang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.