-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathTIFS.tex
75 lines (51 loc) · 2.87 KB
/
TIFS.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
\documentclass[journal,table,twoside]{IEEEtran}
\input{preamble}
\begin{document}
\title{A Video-based Attack for Android Pattern Lock}
\author{Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen,
Willy Wolff, Adam J. Aviv and Zheng Wang
\thanks{G. Ye, Z. Tang, D. Fang, and X. Chen are with Northwest University, China, E-mails: [email protected], \{zytang, dyf, xjchen\}@nwu.edu.cn }%
\thanks{Willy Wolf and Zheng Wang are with Lancaster University, U.K., E-mails: \{w.wolff, z.wang\}@lancaster.ac.uk}%
\thanks{Adam J. Aviv is with Naval Academy, U.S.A., E-mail: [email protected]}
\thanks{
Extension of Conference Paper: a preliminary version of this article entitled ``Cracking Android Pattern Lock
in Five Attempts" by G. Ye, Z. Tang, D. Fang, X. Chen, K. Kim, B. Taylor and Z. Wang appeared in
The Network and Distributed System Security Symposium (NDSS) 2017~\cite{ye2017cracking}.
The extended version makes the following several additional contributions over the conference
paper, providing new insights to the original paper:
(1) It provides new evaluations to understand the impact of the screen size and the camera model on the success of the attack (section~\ref{section: screen-size and cameras});
(2) It extends the attacking method to break PIN-based passwords, demonstrating the applicability of the attack on PIN-based passwords (section~\ref{section: attacking-pin-passwords});
(3) It includes a limited study to evaluate the effectiveness of the attack, where the video footage only captures the fingertip (section~\ref{section: limited-study});
(4) It evaluates the security strength of patterns using an alternative security metric (section~\ref{sec:eval_gussingp});
(5) It proposes a simple, yet effective countermeasure. By making some small modifications to the way a pattern lock is generated, the success rate of the attack will drop significantly (section~\ref{section: potential-remedy});
(6) It extends the related work to discuss some of the recent studies on the security of Android pattern lock in depth (section~\ref{section: relate-work}).
}
}
% The paper headers
\markboth{IEEE Transactions on Information Forensics and Security}%
{Ye \MakeLowercase{\textit{et al.}}: A Video-side Channel Attack for Pattern Lock}
\maketitle
\input{abstract}
\begin{IEEEkeywords}
Pattern lock, Fingertip movement, Video-based attack, Sensitive information.
\end{IEEEkeywords}
\input{intro}
\input{background}
\input{overview}
\input{details}
\input{experiment_setup}
\input{evaluation}
\input{discussion}
\input{related}
\input{conclusions}
\IEEEpeerreviewmaketitle
\ifCLASSOPTIONcaptionsoff
\newpage
\fi
\begin{spacing}{0.98}
\bibliographystyle{IEEEtranS}
\balance
\vspace{-3mm}
\bibliography{refs}
\end{spacing}
\end{document}