{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:08:44Z","timestamp":1767665324395,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319281650"},{"type":"electronic","value":"9783319281667"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28166-7_22","type":"book-chapter","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T15:29:04Z","timestamp":1452266944000},"page":"457-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Exploiting Eye Tracking for Smartphone Authentication"],"prefix":"10.1007","author":[{"given":"Dachuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Bo","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,9]]},"reference":[{"key":"22_CR1","unstructured":"https:\/\/developer.qualcomm.com\/mobile-development\/add-advanced-features\/snapdragon-sdk-android"},{"key":"22_CR2","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: WOOT 2010, pp. 1\u20137. USENIX Association (2010)"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1007\/11499145_79","volume-title":"Image Analysis","author":"R Bednarik","year":"2005","unstructured":"Bednarik, R., Kinnunen, T., Mihaila, A., Fr\u00e4nti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780\u2013789. Springer, Heidelberg (2005)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Berger, Y., Wool, A., Yeredor, A.: Dictionary attacks using keyboard acoustic emanations. In: ACM CCS 2006, pp. 245\u2013254. ACM (2006)","DOI":"10.1145\/1180405.1180436"},{"key":"22_CR5","unstructured":"Cai, L., Chen, H.: Touchlogger: Inferring keystrokes on touch screen from smartphone motion. In: Hot Topics in Security HotSec (2011)"},{"issue":"1","key":"22_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"NL Clarke","year":"2006","unstructured":"Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1\u201314 (2006)","journal-title":"Int. J. Inf. Secur."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"De Luca, A., Denzel, M., Hussmann, H.: Look into my eyes!: can you guess my password?. In: SOUPS 2009, pp. 7:1\u20137:12. ACM (2009)","DOI":"10.1145\/1572532.1572542"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and I know it\u2019s you!: implicit authentication based on touch screen patterns. In: CHI 2012, pp. 987\u2013996. ACM (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"De Luca, A., Weiss, R., Drewes, H.: Evaluation of eye-gaze interaction methods for security enhanced pin-entry. In: OZCHI 2007, pp. 199\u2013202. ACM (2007)","DOI":"10.1145\/1324892.1324932"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"De Luca, A., Weiss, R., Humann, H., An, X.: Eyepass-eye-stroke authentication for public terminals. In: Czerwinski, M., Lund, A.M., Tan, D.S. (eds.) CHI Extended Abstracts, pp. 3003\u20133008. ACM (2008)","DOI":"10.1145\/1358628.1358798"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Drewes, H., De Luca, A., Schmidt, A.: Eye-gaze interaction for mobile phones. In: Mobility 2007, pp. 364\u2013371. ACM (2007)","DOI":"10.1145\/1378063.1378122"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Holland, C., Komogortsev, O.V.: Biometric verification via complex eye movements: the effects of environment and stimulus. In: Biometrics: Theory, Applications and Systems (BTAS), pp. 39\u201346, September 2012","DOI":"10.1109\/BTAS.2012.6374556"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Holland, C.D., Komogortsev, O.V.: Complex eye movement pattern biometrics: analyzing fixations and saccades. In: Proceedings of IAPR ICB (2013)","DOI":"10.1109\/ICB.2013.6612953"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Komogortsev, O.V., Karpov, A., Holland, C.D.: Cue: counterfeit-resistant usable eye movement-based authentication via oculomotor plant characteristics and complex eye movement patterns, vol. 8371, pp. 83711X\u201383711X-9 (2012)","DOI":"10.1117\/12.919219"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: SOUPS 2007, pp. 13\u201319. ACM (2007)","DOI":"10.1145\/1280680.1280683"},{"key":"22_CR16","unstructured":"Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. The Internet Society. In: NDSS (2013)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial \u201cgummy\u201d fingers on fingerprint systems, vol. 4677, pp. 275\u2013289 (2002)","DOI":"10.1117\/12.462719"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: MobiSys 2012, pp. 323\u2013336. ACM (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: password inference using accelerometers on smartphones. In: HotMobile 2012, pp. 9:1\u20139:6. ACM (2012)","DOI":"10.1145\/2162081.2162095"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Serwadda, A., Phoha, V.V.: When kids\u2019 toys breach mobile phone security. In: ACM CCS 2013, pp. 599\u2013610. ACM (2013)","DOI":"10.1145\/2508859.2516659"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: MobiCom 2013, pp. 39\u201350. ACM (2013)","DOI":"10.1145\/2500423.2500434"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Vaitukaitis, V., Bulling, A.: Eye gesture recognition on portable devices. In: UbiComp 2012, pp. 711\u2013714. ACM (2012)","DOI":"10.1145\/2370216.2370370"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Vidal, M., Bulling, A., Gellersen, H.: Detection of smooth pursuits using eye movement shape features. In: ETRA, pp. 177\u2013180. ACM (2012)","DOI":"10.1145\/2168556.2168586"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Vidal, M., Bulling, A., Gellersen, H.: Pursuits: spontaneous interaction with displays based on smooth pursuit eye movement and moving targets. In: UbiComp 2013, pp. 439\u2013448. ACM (2013)","DOI":"10.1145\/2493432.2493477"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Xu, Y., Heinly, J., White, A.M., Monrose, F., Frahm, J.: Seeing double: reconstructing obscured typed input from repeated compromising reflections. In: ACM CCS 2013, pp. 1063\u20131074. ACM (2013)","DOI":"10.1145\/2508859.2516709"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: WISEC 2012, pp. 113\u2013124. ACM (2012)","DOI":"10.1145\/2185448.2185465"},{"key":"22_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-04342-0_12","volume-title":"Recent Advances in Intrusion Detection","author":"S Zahid","year":"2009","unstructured":"Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-based user identification on smart phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 224\u2013243. Springer, Heidelberg (2009)"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: User verification on smartphones via tapping behaviors. In: IEEE ICNP (2014)","DOI":"10.1109\/ICNP.2014.43"},{"issue":"1","key":"22_CR29","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/1609956.1609959","volume":"13","author":"L Zhuang","year":"2009","unstructured":"Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur. 13(1), 3:1\u20133:26 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28166-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T05:36:14Z","timestamp":1654061774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28166-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319281650","9783319281667"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28166-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}