Skip to main content

Security Analysis of Touch Inputted Passwords

A Preliminary Study Based on the Resistance against Brute Force Attacks

  • Conference paper
Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

Abstract

In this paper, we present a security analysis of a few touch inputted authentication methods (Android´s PIN and pattern unlock, and iconographic password), based mainly on the resistance against brute force attacks. In order to support our study, we developed a set of specific tools for performing the tests against each method. Recommendations for improving the security of the aforementioned mechanisms are given based on the experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hoog, A.: Android forensics: investigation, analysis and mobile security for Google Android. Syngress (2011)

    Google Scholar 

  2. Suo, X., Zhu, Y., Owen, G.: Graphical passwords: a survey. In: Proceedings of the 21st Annual Computer Security Applications Conference, ACSAC 2005, pp. 463–472 (2005)

    Google Scholar 

  3. Tambascia, C., Duarte, R., Menezes, E.: Usability evaluation of iconographic authentication for mobile devices using Eye tracking. In: MOBILITY 2011 (October 2011)

    Google Scholar 

  4. Ávila, I., Menezes, E., Braga, A.: Memorization Techniques in Iconic Passwords. In: IHCI 2012 (July 2012)

    Google Scholar 

  5. Tambascia, C., Braga, A., Menezes, E., Negrão, F.: User Experience Evaluation in the Creation and Use of Iconographic Passwords for Authentication in Mobile Devices. In: MOBILITY 2012 (October 2012)

    Google Scholar 

  6. Milano, D.: Android application testing guide. Packt Publishing (2011)

    Google Scholar 

  7. Botelho, B., Nakamura, E., Uto, N.: Implementation of tools for brute forcing touch inputted passwords. In: ICITST 2012 (December 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pereira Botelho, B.A., Nakamura, E.T., Uto, N. (2013). Security Analysis of Touch Inputted Passwords. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics