Browse > Article
http://dx.doi.org/10.9717/kmms.2020.24.3.440

A Study on User Authentication Method for Foldable Screen-Based Devices  

Choi, Dongmin (Div. of Undeclared Majors, Chosun University)
Publication Information
Abstract
Smartphones are currently being produced with similar functions, shapes, and software. The foldable smartphone is a product that dramatically changed the shape of the existing smartphone. Therefore, it affects the functions and software. In this paper, we analyze the potential security vulnerability of current mobile authentication methods by dividing them into two parts, security vulnerabilities of non-foldable smartphones, and security vulnerability that appears with the changed smartphone structure. According to the analysis result, the classic and current mobile user authentication methods appears to be easily affected by the smartphone display structure. Finally, we propose an appropriate authentication method as well as the concept of security measures for smartphones with foldable screen. Our method shows that it is more secure than the conventional authentication methods in foldable display smartphone.
Keywords
Foldable Screen; Authentication Method; In-folding Structure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Samsung Galaxy fold 5G(2019). https://www.samsung.com/sec/smartphones/galaxy-foldsm-f907/SM-F907NZSAKOO/ (accessed Feb ruary 19, 2021).
2 Motorola razr(2020). https://www.motorola.co.uk/smartphones-razr (accessed February 19, 2021).
3 Royole FlexPai 2 5G(2020). https://global.royole.com/en/flexpai (accessed February 19, 2021).
4 Huawei Mate Xs 5G(2019). https://consumer.huawei.com/kr/phones/mate-x-s/ (accessed February 19, 2021).
5 Tech yourself Foldable Phones in 10 steps: Report(2018). https://www.slashgear.com/samsung-galaxy-foldable-smartphone-details-analysis-industry-market-14557949/ (accessed February 19, 2021).
6 Folding the Web Enabling real responsive design on foldable devices(2020). https://medium.com/samsung-internet-dev/folding-the-web-90952c925d52 (accessed February 19, 2021).
7 Foldables to Hit 100 Million by 2025(2020). https://www.strategyanalytics.com/access-services/devices/mobile-phones/emerging-device-technologies/reports/report-detail/foldables-to-hit-100-million-by-2025 (accessed February 19, 2021).
8 Samsung Electronics earnings outlook: Promoting popularization of foldable smartphones next year(2020). http://www.thelec.kr/news/articleView.html?idxno=8543 (accessed February 19, 2021).
9 iPhone Flip: Everything we know about Apple's foldable phone plans(2021). https://www.tomsguide.com/news/iphone-flip-everythingwe-know-about-apples-foldable-phone-plans (accessed February 20, 2021).
10 From the 'Brick' to New Foldable Phones: The History of the Mobile Form Factor(2020). https://community.arm.com/developer/ip-products/processors/b/processors-ip-blog/posts/history-of-the-mobile-form-factor (accessed February 20, 2021).
11 J. Bonneau, S. Preibusch, and R. Anderson, "A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs," Proceeding of International Conference on Financial Cryptography and Data Security, pp. 25-40, 2012.
12 Samsung picks in-folding type for foldable smartphone(2017). http://www.theinvestor.co.kr/view.php?ud=20170928000900 (accessed February 20, 2021).
13 M. Shahzad, A. X. Liu, and A. Samuel, "Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it," Proceeding of the 19th Annual International Conference on Mobile Computing & Networking, pp. 39, 2013.
14 I. Kim, "Keypad against Brute Force Attacks on Smartphones," IET Information Security, Vol. 6, No. 2, pp. 71-76, 2012.   DOI
15 A.K. Kyaw, F. Sioquim, and J. Joseph, "Dictionary Attack on Wordpress: Security and Forensic Analysis," Proceedings of the 2nd International Conference on Information Security and Cyber Forensics, pp. 158-164, 2015.
16 Social Engineering Attacks: Common Techniques & How to Prevent an Attack(2020). https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack (accessed February 20, 2021).
17 E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R.R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints," Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323-336, 2012.
18 X. Su ,Z. Wang, X. Liu, C. Choi, and D. Choi, "Study to Improve Security for IoT Smart Device Controller: Drawbacks and Counter-measures," Security and Communication Networks, Vol. 2018, No. 4296934, pp. 1-14, 2018.
19 H. Kim, H. Seo, Y. Lee, T. Park, and H. Kim, "Implementation of Secure Virtual Financial Keypad for Shoulder Surfing Attack," Korea Institute of Information Security and Cryptography, Vol. 23, No. 6, pp. 21-29, 2013.
20 T. Takada, "Fake Pointer: An Authentication Scheme for Improving Security against Peeping Attacks using Video Cameras," Proceeding of International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 395-400, 2008.
21 FLIR ONE PRO LT(2020). https://www.flirkorea.com/products/flir-one-pro-lt/ (accessed February 20, 2021).
22 A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J.M. Smith, "Smudge Attacks on Smartphone Touch Screens," Proceeding of USENIX Conference on Offensive Technologies, pp. 1-7, 2010.
23 Y. Abdelrahman, M. Khamis, S. Schneegass, and F. Alt, "Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication," Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751-3763, 2017.
24 Integrated thermal imaging(2019). https://www.catphones.com/en-dk/features/integrated-thermal-imaging/ (accessed February 19, 2021).
25 D. Choi, "Indirect PIN Entry Method for Mobile Banking Using Relative Location Information of Secret Code," Journal of Korea Multimedia Society, Vol. 23, No. 6, pp. 738-746, 2020.