1 |
L. Cai and H. Chen, "TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion," Proceedings of 6th UNIX and Advanced Computing Systems Professional and Technical Association Conference on Hot Topics in Security, pp. 9-9, 2011.
|
2 |
E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R.R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints," Proceedings of International Conference on Mobile Systems, Applications, and Services, pp. 323-336, 2012.
|
3 |
H. Kim, H. Seo, Y. Lee, T. Park, and H. Kim, “Implementation of Secure Virtual Financial Keypad for Shoulder Surfing Attack,” Korea Institute of Information Security and Cryptography, Vol. 23, No. 6, pp. 21-29, 2013.
|
4 |
H. Sun, S. Chen, J. Yeh, and C. Cheng, "A Shoulder Surfing Resistant Graphical Authentication System," IEEE Transactions on Dependable and Secure Computing, Vol. 15, Issue 2, pp. 1-1, 2016.
|
5 |
Password Security: Top 20 Most Common Passwords Revealed(2018), https://vpns.co.uk/the-20-most-common-passwords-by-keyboard-pattern/ (accessed May 09, 2020).
|
6 |
PIN Analysis(2012), https://www.datagenetics.com/blog/september32012/ (accessed May 09, 2020).
|
7 |
Y. Abdelrahman, M. Khamis, S. Schneegass, and F. Alt, "Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication," Proceedings of Conference on Human Factors in Computing Systems, pp. 3751-3763, 2017.
|
8 |
Y. Lee, "An Analysis on the Vulnerability of Secure Keypads for Mobile Devices," Journal of Korean Society for Internet Information, Vol. 14, No. 3, pp. 15-21, 2013.
|
9 |
J. Lee, J. Lee, and D. Park, "Smart Lock Design Using by Complex Context-Information," Proceedings of the Conference on Korea Human Computer Interaction Society, pp. 197-202, 2018.
|
10 |
T. Kwon and S. Na, "Switch PIN: Securing Smartphone PIN Entry with Switchable Keypads," Proceedings of the IEEE International Conference on Consumer Electronics, pp. 23-24, 2014.
|
11 |
Thermal Imaging Camera CAT S61(2019), https://www.catphones.com/en-dk/features/integrated-thermal-imaging/ (accessed May 09, 2020).
|
12 |
Smartphone Camera(2020), https://www.zdnet.co.kr/view/?no=20200324181642 (accessed May 09, 2020).
|
13 |
K. Cheoi and J. Han, "A Novel Door Security System Using Hand Gesture Recognition," Journal of Korea Multimedia Society, Vol. 19, No. 8, pp. 1320-1328, 2016.
DOI
|
14 |
Galaxy S20 5G(2020), https://www.samsung.com/sec/smartphones/galaxy-s20/specs/ (accessed May 09, 2020).
|
15 |
Huawei P30 Pro, https://brunch.co.kr/@bkoon/24 (accessed May 09, 2020).
|
16 |
T. Takada, "Fake Pointer: An Authentication Scheme for Improving Security against Peeping Attacks Using Video Cameras," Proceeding of International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 395-400, 2008.
|
17 |
A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J.M. Smith, "Smudge Attacks on Smartphone Touch Screens," Proceedings of 4th UNIX and Advanced Computing Systems Professional and Technical Association Conference on Offensive Technologies, pp. 1-7, 2010.
|