Using icon arrangement for fallback authentication on smartphones

In this paper, we present three concepts for fallback authentication on smartphones that exploit the icon arrangement on home screens. A pilot study with three groups (each with n=6) was conducted to evaluate these concepts in terms of usability and security. The results show that most users made no or only few errors. In turn, adversaries had more difficulties in solving the tasks.