From hot-spots towards experience-spots: Leveraging on users' sociocultural experiences to enhance security in cued-recall graphical authentication

[1]  Borka Jerman-Blazic,et al.  Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication , 2016, Int. J. Hum. Comput. Interact..

[2]  Julie Thorpe,et al.  Purely Automated Attacks on PassPoints-Style Graphical Passwords , 2010, IEEE Transactions on Information Forensics and Security.

[3]  Jeff Yan,et al.  Do background images improve "draw a secret" graphical passwords? , 2007, CCS '07.

[4]  Konstantin Beznosov,et al.  Know your enemy: the risk of unauthorized access in smartphones by insiders , 2013, MobileHCI '13.

[5]  Robert Biddle,et al.  Graphical passwords: Learning from the first twelve years , 2012, CSUR.

[6]  Marios Belk,et al.  FlexPass: Symbiosis of Seamless User Authentication Schemes in IoT , 2019, CHI Extended Abstracts.

[7]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[8]  Michael K. Reiter,et al.  On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.

[9]  Marios Belk,et al.  On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords , 2019, UMAP.

[10]  Steven Furnell,et al.  Why users cannot use security , 2005, Comput. Secur..

[11]  Alireza Sahami Shirazi,et al.  Graphical Passwords in the Wild: Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes , 2015, MobileHCI.

[12]  Marios Belk,et al.  Sweet-spotting security and usability for intelligent graphical authentication mechanisms , 2017, WI.

[13]  Cengiz Acartürk,et al.  The Role of Visual Coherence in Graphical Passwords , 2013, CogSci.

[14]  Marios Belk,et al.  Using Eye Gaze Data and Visual Activities to Infer Human Cognitive Styles: Method and Feasibility Studies , 2017, UMAP.

[15]  Ziming Zhao,et al.  On the Security of Picture Gesture Authentication , 2013, USENIX Security Symposium.

[16]  Nicolas Christin,et al.  Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes , 2011, CHI.

[17]  T. B. Rogers,et al.  Self-reference and the encoding of personal information. , 1977, Journal of personality and social psychology.

[18]  Thomas S. Tullis,et al.  Can users remember their pictorial passwords six years later , 2011, CHI EA '11.

[19]  Sven Grawunder,et al.  The phonetic profile of Korean formal and informal speech registers , 2012, J. Phonetics.

[20]  Tsuhan Chen,et al.  A visual dictionary attack on Picture Passwords , 2013, 2013 IEEE International Conference on Image Processing.

[21]  Nikolaos M. Avouris,et al.  Using Eye Tracking to Identify Cognitive Differences: A Brief Literature Review , 2016, PCI.

[22]  M. Erez,et al.  A Dynamic, Multi‐Level Model of Culture: From the Micro Level of the Individual to the Macro Level of a Global Culture , 2004 .

[23]  Bruce L. Riddle,et al.  Passwords in use in a university timesharing environment , 1989, Comput. Secur..

[24]  Marios Belk,et al.  A Cross-cultural Perspective for Personalizing Picture Passwords , 2020, UMAP.

[25]  Tadayoshi Kohno,et al.  A comprehensive study of frequency, interference, and training of multiple graphical passwords , 2009, CHI.

[26]  Florian Alt,et al.  The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions , 2020, CHI.

[27]  Panagiotis Germanakos,et al.  The interplay between humans, technology and user authentication: A cognitive processing perspective , 2017, Comput. Hum. Behav..

[28]  Michael Weber,et al.  Exploring the design space of graphical passwords on smartphones , 2013, SOUPS.

[29]  Konstantin Beznosov,et al.  Does my password go up to eleven?: the impact of password meters on password selection , 2013, CHI.

[30]  Robert Biddle,et al.  Graphical Password Authentication Using Cued Click Points , 2007, ESORICS.

[31]  Alain Forget,et al.  Influencing users towards better passwords: persuasive cued click-points , 2008, BCS HCI.

[32]  Raymond Chang,et al.  Content-specific activity in frontoparietal and default-mode networks during prior-guided visual perception , 2018, eLife.

[33]  Julie Thorpe,et al.  The presentation effect on graphical passwords , 2014, CHI.

[34]  Ziming Zhao,et al.  Picture Gesture Authentication , 2015, ACM Trans. Inf. Syst. Secur..

[35]  S. B. Hutton,et al.  Eye Tracking Methodology , 2019, Eye Movement Research.

[36]  Marios Belk,et al.  “I Recall this Picture”: Understanding Picture Password Selections based on Users’ Sociocultural Experiences , 2019, 2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI).

[37]  Elizabeth Stobert,et al.  Memory retrieval and graphical passwords , 2013, SOUPS.

[38]  Albrecht Schmidt,et al.  Increasing the security of gaze-based cued-recall graphical passwords using saliency masks , 2012, CHI.

[39]  Marios Belk,et al.  On sociocultural-centered graphical passwords: an initial framework , 2018, MobileHCI Adjunct.

[40]  Marios Belk,et al.  Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition , 2018, CHI.

[41]  D. Bates,et al.  Fitting Linear Mixed-Effects Models Using lme4 , 2014, 1406.5823.

[42]  Julie Thorpe,et al.  Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords , 2007, USENIX Security Symposium.

[43]  Julie Thorpe,et al.  Exploiting predictability in click-based graphical passwords , 2011, J. Comput. Secur..

[44]  Nasir D. Memon,et al.  Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.

[45]  Vito Di Gesù,et al.  A fuzzy approach to the evaluation of image complexity , 2009, Fuzzy Sets Syst..

[46]  Nicolas Christin,et al.  Use Your Illusion: secure authentication usable anywhere , 2008, SOUPS '08.

[47]  Marios Belk,et al.  On Cultural-centered Graphical Passwords: Leveraging on Users' Cultural Experiences for Improving Password Memorability , 2018, UMAP.

[48]  Marios Belk,et al.  An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots , 2020, IUI.

[49]  E. Tulving,et al.  Episodic and semantic memory , 1972 .

[50]  Karen Renaud,et al.  On user involvement in production of images used in visual authentication , 2009, J. Vis. Lang. Comput..

[51]  Thomas S. Tullis,et al.  Using personal photos as pictorial passwords , 2005, CHI Extended Abstracts.

[52]  Yael Pritch,et al.  Saliency filters: Contrast based filtering for salient region detection , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[53]  Marios Belk,et al.  Influences of Mixed Reality and Human Cognition on Picture Passwords: An Eye Tracking Study , 2019, INTERACT.

[54]  Borka Jerman-Blazic,et al.  On designing usable and secure recognition-based graphical authentication mechanisms , 2011, Interact. Comput..

[55]  A. Paivio,et al.  Picture superiority in free recall: Imagery or dual coding? , 1973 .