245,377 research outputs found

    Towards Baselines for Shoulder Surfing on Mobile Authentication

    Full text link
    Given the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the research community has investigated solutions to minimize or prevent the threat of shoulder surfing, our understanding of how the attack performs on current systems is less well studied. In this paper, we describe a large online experiment (n=1173) that works towards establishing a baseline of shoulder surfing vulnerability for current unlock authentication systems. Using controlled video recordings of a victim entering in a set of 4- and 6-length PINs and Android unlock patterns on different phones from different angles, we asked participants to act as attackers, trying to determine the authentication input based on the observation. We find that 6-digit PINs are the most elusive attacking surface where a single observation leads to just 10.8% successful attacks, improving to 26.5\% with multiple observations. As a comparison, 6-length Android patterns, with one observation, suffered 64.2% attack rate and 79.9% with multiple observations. Removing feedback lines for patterns improves security from 35.3\% and 52.1\% for single and multiple observations, respectively. This evidence, as well as other results related to hand position, phone size, and observation angle, suggests the best and worst case scenarios related to shoulder surfing vulnerability which can both help inform users to improve their security choices, as well as establish baselines for researchers.Comment: Will appear in Annual Computer Security Applications Conference (ACSAC

    Motivating physical activity at work: using persuasive social media extensions for simple mobile devices

    Get PDF
    Powerful behaviour change programmes can be developed through a combination of very simple, accessible technology, and an understanding of the psychological processes that drive behaviour change. We present a study in which very basic digital pedometers were used to record the number of steps taken by participants over the course of a normal working day. A Facebook application, named Step Matron, was utilised to provide a social and competitive context for pedometer readings. We were particularly interested in whether interactions between users via the application more successfully motivated physical activity than simply recording daily step counts in a similar application. Ten participants (1 male), all nurses working in a UK hospital, used the application across two conditions over the course of the study. In the socially-enabled condition, participants could view each other’s step data and make comparisons and comments. In the non-social condition, participants could only view their own personal step data. A significant increase in step activity was observed in the socially enabled condition. Our findings highlight the potential of social media as a means for generating positive behaviour change. They also suggest that simple mobile devices can function as an inexpensive, accessible and powerful trigger towards this behaviour change without necessitating the use of overly complex and expensive mobile applications or device

    A frame signature matrix for analysing and comparing interaction design behaviour

    Get PDF
    Protocol studies are an established method to investigate design behaviour. In the context of a project to investigate novice interaction design (ID) behaviour across protocols and cultures, we found that existing design behaviour analysis frameworks did not provide reliable results. This paper describes the development of a new approach to analyse and compare ID behaviour using verbal protocols. We augment Schön’s basic design and reflection cycle with construction of a frame signature matrix and analogical categorisation coding. We demonstrate this approach by comparing two protocols of novice interaction designers in Botswana. The initial findings indicate that this approach increases consistency and accuracy of coding, and that there are different degrees of reframing for the design problem and solutions

    Comparing Bottled Water and Tap Water: Experiments in Risk Communication

    Get PDF
    The author discusses results of experiments in risk communication comparing bottled water and tap water

    Compressed materialised views of semi-structured data

    Get PDF
    Query performance issues over semi-structured data have led to the emergence of materialised XML views as a means of restricting the data structure processed by a query. However preserving the conventional representation of such views remains a significant limiting factor especially in the context of mobile devices where processing power, memory usage and bandwidth are significant factors. To explore the concept of a compressed materialised view, we extend our earlier work on structural XML compression to produce a combination of structural summarisation and data compression techniques. These techniques provide a basis for efficiently dealing with both structural queries and valuebased predicates. We evaluate the effectiveness of such a scheme, presenting results and performance measures that show advantages of using such structures

    Wireless Software Synchronization of Multiple Distributed Cameras

    Full text link
    We present a method for precisely time-synchronizing the capture of image sequences from a collection of smartphone cameras connected over WiFi. Our method is entirely software-based, has only modest hardware requirements, and achieves an accuracy of less than 250 microseconds on unmodified commodity hardware. It does not use image content and synchronizes cameras prior to capture. The algorithm operates in two stages. In the first stage, we designate one device as the leader and synchronize each client device's clock to it by estimating network delay. Once clocks are synchronized, the second stage initiates continuous image streaming, estimates the relative phase of image timestamps between each client and the leader, and shifts the streams into alignment. We quantitatively validate our results on a multi-camera rig imaging a high-precision LED array and qualitatively demonstrate significant improvements to multi-view stereo depth estimation and stitching of dynamic scenes. We release as open source 'libsoftwaresync', an Android implementation of our system, to inspire new types of collective capture applications.Comment: Main: 9 pages, 10 figures. Supplemental: 3 pages, 5 figure

    DOLPHIN: the design and initial evaluation of multimodal focus and context

    Get PDF
    In this paper we describe a new focus and context visualisation technique called multimodal focus and context. This technique uses a hybrid visual and spatialised audio display space to overcome the limited visual displays of mobile devices. We demonstrate this technique by applying it to maps of theme parks. We present the results of an experiment comparing multimodal focus and context to a purely visual display technique. The results showed that neither system was significantly better than the other. We believe that this is due to issues involving the perception of multiple structured audio sources
    corecore