Abstract
In this paper, we present a security analysis of a few touch inputted authentication methods (Android´s PIN and pattern unlock, and iconographic password), based mainly on the resistance against brute force attacks. In order to support our study, we developed a set of specific tools for performing the tests against each method. Recommendations for improving the security of the aforementioned mechanisms are given based on the experimental results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hoog, A.: Android forensics: investigation, analysis and mobile security for Google Android. Syngress (2011)
Suo, X., Zhu, Y., Owen, G.: Graphical passwords: a survey. In: Proceedings of the 21st Annual Computer Security Applications Conference, ACSAC 2005, pp. 463–472 (2005)
Tambascia, C., Duarte, R., Menezes, E.: Usability evaluation of iconographic authentication for mobile devices using Eye tracking. In: MOBILITY 2011 (October 2011)
Ávila, I., Menezes, E., Braga, A.: Memorization Techniques in Iconic Passwords. In: IHCI 2012 (July 2012)
Tambascia, C., Braga, A., Menezes, E., Negrão, F.: User Experience Evaluation in the Creation and Use of Iconographic Passwords for Authentication in Mobile Devices. In: MOBILITY 2012 (October 2012)
Milano, D.: Android application testing guide. Packt Publishing (2011)
Botelho, B., Nakamura, E., Uto, N.: Implementation of tools for brute forcing touch inputted passwords. In: ICITST 2012 (December 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pereira Botelho, B.A., Nakamura, E.T., Uto, N. (2013). Security Analysis of Touch Inputted Passwords. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_61
Download citation
DOI: https://doi.org/10.1007/978-3-642-38631-2_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38630-5
Online ISBN: 978-3-642-38631-2
eBook Packages: Computer ScienceComputer Science (R0)