{"title":"Preventing shoulder-surfing when selecting pass-images in challenge set","authors":"S. Jebriel, R. Poet","doi":"10.1109/INNOVATIONS.2011.5893865","DOIUrl":null,"url":null,"abstract":"In this paper we present an experiment to detect the vulnerability of recognition based graphical authentication system to shoulder surfing. The experiment is conducted with teams of two, a user logging in to such as system and an observer who is trying to spot the user's pass-image. Our results suggest that inputting our choice via the keyboard is more secure than using a mouse. We use three different ways of clicking keyboard input and find that they are all approximate equally secure.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Innovations in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INNOVATIONS.2011.5893865","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
In this paper we present an experiment to detect the vulnerability of recognition based graphical authentication system to shoulder surfing. The experiment is conducted with teams of two, a user logging in to such as system and an observer who is trying to spot the user's pass-image. Our results suggest that inputting our choice via the keyboard is more secure than using a mouse. We use three different ways of clicking keyboard input and find that they are all approximate equally secure.