Evaluating the effect of multi-touch behaviours on Android unlock patterns

被引:12
作者
Meng, Weizhi [1 ,2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Inst Infocomm Res, Infocomm Secur Dept, Singapore, Singapore
关键词
Graphical password; Android unlock patterns; Mobile security; User authentication;
D O I
10.1108/ICS-12-2014-0078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - This paper aims to evaluate the effect of multi-touch behaviours on creating Android unlock patterns (AUPs) by realising that users can perform more actions in touch-enabled mobile phones. Design/methodology/approach - The author conducted two user studies with a total of 45 participates and performed two major experiments in the main user study. Findings - The user study indicates that the multi-touch behaviours can have a positive impact on creating patterns; however, there are only nine touchable points for the original AUPs, which may reduce the usability when performing a multi-touch movement. Research limitations/implications - An even larger user study could be conducted to further analyse the patterns generated by users, that is, to analyse the specific password space by integrating the behaviours of multi-touch and to involve more types of multi-touch behaviours in creating an AUP. Practical implications -This work explores the effect of multi-touch movement on creating AUPs. The results should be of interest for software developers and security researchers for exploring the effect of multi-touch behaviours on the creation of graphical passwords on mobile phones. Originality/value - The author conducts two user studies with a total of 45 participants to investigate the impact of multi-touch behaviours on creating AUPs. In addition, to address the issue of usability, the author proposes two ways: increasing the number of touchable points and improve the rules of pattern creation.
引用
收藏
页码:277 / 287
页数:11
相关论文
共 20 条
[1]  
Andriotis P., 2013, P 6 ACM C SECURITY P, P1, DOI [10.1145/2462096.2462098, DOI 10.1145/2462096.2462098]
[2]  
Blonder G., 1996, GRAPHICAL PASSWORDS
[3]  
Chiasson S, 2007, LECT NOTES COMPUT SC, V4734, P359
[4]  
Churchill Berkeley, 2013, UNLOCK PATTERN GENER
[5]  
Davis D, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P151
[6]  
De Luca A., 2012, P SIGCHI C HUM FACT, P987, DOI DOI 10.1145/2207676.2208544
[7]  
Dunphy P, 2010, P 6 S US PRIV SEC SO, P1
[8]  
Jermyn I, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P1
[9]  
Karlson AK, 2009, CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1647
[10]  
Lin D., 2007, P 3 S USABLE PRIVACY, P161