Acknowledgement
This research was partly supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2019-2014-1-00743) supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation) and this research was partly supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1C1B5075742).
References
- K. H. An, H. D. Kwon, K. H. Kim, and H. J. Seo, "Implement pattern lock security enhancement using thread to measure input time," Journal of the Korea Institute of Information and Communication Engineering, vol. 23, no. 4, pp. 470-476, Apr. 2019. https://doi.org/10.6109/JKIICE.2019.23.4.470
- M. D. Loge, "Tell Me Who You Are and I Will Tell You Your Unlock Pattern," M. S. theses, Norwegian University of Science and Technology, Trondheim, Sor-Trondelag, 2015.
- A. H. Lashkari, S. Farmand, O. B. Zakaria, and R. Saleh, "Shoulder Surfing attack in graphical password authentication," International Journal of Computer Science and Information Security, vol. 6, no. 2, pp. 145-154, Nov. 2009.
- A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, "Smudge attacks on smartphone touch screens," in Workshop on Offensive Technologies'10 Proceedings of the 4th USENIX conference on Offensive technologies, Washington: DC, pp. 1-7, 2010.
- P. Andriotis, G. Oikonomou, A. Mylonas, and T. Tryfonas, "A Study on Usability and Security Features of the Android Pattern Lock Screen," Information and Computer Security, vol. 24, no. 1, pp. 53-72, March. 2016. https://doi.org/10.1108/ICS-01-2015-0001
- S. M. Jung, and T. K. Kwon, "Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems," Journal of The Korea Institute of Information Security and Cryptology, vol. 26, no. 4, pp. 903-910, Aug. 2016. https://doi.org/10.13089/JKIISC.2016.26.4.903
- G. Ye, Z. Tang, D. Fang, X. Chen, K. I. Kim, B. Taylor, and Z. Wang, "Cracking Android Pattern Lock in Five Attempts," in Proceedings 2017 Proceedings of the Network and Distributed System Security Symposium, San Diego: CA, pp. 1-1, 2017.