{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:41Z","timestamp":1750307201084,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2078827.2078834","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Breaking undercover"],"prefix":"10.1145","author":[{"given":"Toni","family":"Perkovi\u0107","sequence":"first","affiliation":[{"name":"FESB, University of Split, Croatia"}]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"University of Konstanz, Germany"}]},{"given":"Asma","family":"Mumtaz","sequence":"additional","affiliation":[{"name":"National University of Science and Technology (NUST), Pakistan"}]},{"given":"Syed Ali","family":"Khayam","sequence":"additional","affiliation":[{"name":"National University of Science and Technology (NUST), Pakistan"}]},{"given":"Yousra","family":"Javed","sequence":"additional","affiliation":[{"name":"National University of Science and Technology (NUST), Pakistan"}]},{"given":"Mario","family":"\u010cagalj","sequence":"additional","affiliation":[{"name":"FESB, University of Split, Croatia"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69057-3_12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/188280.188291"},{"key":"e_1_3_2_1_4_1","volume-title":"13th International Conference, ISC 2010, Revised Selected Papers","volume":"6531","author":"Asghar H. J.","year":"2011","unstructured":"H. J. Asghar , S. Li , J. Pieprzyk and H. Wang . Cryptanalysis of the Convex Hull Click human identification protocol. In Information Security , 13th International Conference, ISC 2010, Revised Selected Papers , Volume 6531 of Lecture Notes in Computer Science, 24--30, Springer , 2011 . H. J. Asghar, S. Li, J. Pieprzyk and H. Wang. Cryptanalysis of the Convex Hull Click human identification protocol. In Information Security, 13th International Conference, ISC 2010, Revised Selected Papers, Volume 6531 of Lecture Notes in Computer Science, 24--30, Springer, 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"8th International Conference, ACNS 2010, Proceedings","volume":"6123","author":"Asghar H. J.","year":"2010","unstructured":"H. J. Asghar , J. Pieprzyk and H. Wang . A new human identification protocol and Coppersmith's baby-step giant-step algorithm. In Applied Cryptography and Network Security , 8th International Conference, ACNS 2010, Proceedings , Volume 6123 of Lecture Notes in Computer Science, 349--366, Springer , 2010 . H. J. Asghar, J. Pieprzyk and H. Wang. A new human identification protocol and Coppersmith's baby-step giant-step algorithm. In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Proceedings, Volume 6123 of Lecture Notes in Computer Science, 349--366, Springer, 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"Computer Viruses and Malware","author":"Aycock J.","year":"2006","unstructured":"J. Aycock . Computer Viruses and Malware . Springer , 2006 . J. Aycock. Computer Viruses and Malware. Springer, 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.23"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754029"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753488"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 13th USENIX Security Symposium, 151--164","author":"Davis D.","year":"2004","unstructured":"D. Davis , F. Monrose and M. K. Reiter . On user choice in graphical password schemes . In Proceedings of the 13th USENIX Security Symposium, 151--164 , USENIX, 2004 . D. Davis, F. Monrose and M. K. Reiter. On user choice in graphical password schemes. In Proceedings of the 13th USENIX Security Symposium, 151--164, USENIX, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463218"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837131"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518840"},{"key":"e_1_3_2_1_15_1","volume-title":"Issue 3","author":"Deyle T.","year":"2006","unstructured":"T. Deyle and V. Roth . Accessible authentication via tactile pin entry. Computer Graphics Topics , Issue 3 , 2006 . http:\/\/www.zgdv.de\/PDFs\/topics\/2006\/topics3_2006.pdf. T. Deyle and V. Roth. Accessible authentication via tactile pin entry. Computer Graphics Topics, Issue 3, 2006. http:\/\/www.zgdv.de\/PDFs\/topics\/2006\/topics3_2006.pdf."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 9th Conference on USENIX Security Symposium, 45--58","author":"Dhamija R.","year":"2000","unstructured":"R. Dhamija and A. Perrig . D\u00e9j\u00e0 Vu: a user study using images for authentication . In Proceedings of the 9th Conference on USENIX Security Symposium, 45--58 , USENIX, 2000 . R. Dhamija and A. Perrig. D\u00e9j\u00e0 Vu: a user study using images for authentication. In Proceedings of the 9th Conference on USENIX Security Symposium, 45--58, USENIX, 2000."},{"key":"e_1_3_2_1_17_1","volume-title":"Mobile Malware Attacks and Defense","author":"Technical K.","year":"2008","unstructured":"K. Dunham ( Technical Editor). Mobile Malware Attacks and Defense . Syngress Publishing , 2008 . K. Dunham (Technical Editor). Mobile Malware Attacks and Defense. Syngress Publishing, 2008."},{"key":"e_1_3_2_1_18_1","first-page":"449","volume":"1","author":"Fleming Fallon L.","year":"2005","unstructured":"L. Fleming Fallon . Color blindness. In Gale Encyclopedia of Children's Health: Infancy through Adolescence , Volume 1 , 449 -- 452 , Gale, 2005 . L. Fleming Fallon. Color blindness. In Gale Encyclopedia of Children's Health: Infancy through Adolescence, Volume 1, 449--452, Gale, 2005.","journal-title":"Adolescence"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572584"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology -- ASIACRYPT","author":"Hopper N. J.","year":"2001","unstructured":"N. J. Hopper and M. Blum . Secure human identification protocols . In Advances in Cryptology -- ASIACRYPT 2001 , Volume 2248 of Lecture Notes in Computer Science , 52--66, Springer , 2001. N. J. Hopper and M. Blum. Secure human identification protocols. In Advances in Cryptology -- ASIACRYPT 2001, Volume 2248 of Lecture Notes in Computer Science, 52--66, Springer, 2001."},{"key":"e_1_3_2_1_24_1","volume-title":"Phishing and Countermeasures","author":"Jakobsson M.","year":"2007","unstructured":"M. Jakobsson and S. Myers (Editors). Phishing and Countermeasures . John Wiley & Sons , 2007 . M. Jakobsson and S. Myers (Editors). Phishing and Countermeasures. John Wiley & Sons, 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00306-6_16"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 20th British HCI Group Annual Conference on People and Computers (HCI'2006)","volume":"2","author":"Kuber R.","year":"2006","unstructured":"R. Kuber and W. Yu . Authentication using tactile feedback . In Proceedings of the 20th British HCI Group Annual Conference on People and Computers (HCI'2006) , Volume 2 , 141--145, British Computer Society , 2006 . R. Kuber and W. Yu. Authentication using tactile feedback. In Proceedings of the 20th British HCI Group Annual Conference on People and Computers (HCI'2006), Volume 2, 141--145, British Computer Society, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.11.001"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.297"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.27"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502416"},{"key":"e_1_3_2_1_33_1","volume-title":"Secure Human-Computer Identification against peeping attacks (SecHCI): A survey. Technical report","author":"Li S.","year":"2003","unstructured":"S. Li and H.-Y. Shum . Secure Human-Computer Identification against peeping attacks (SecHCI): A survey. Technical report , 2003 . http:\/\/www.hooklee.com\/Papers\/SecHCI-Survey.pdf. S. Li and H.-Y. Shum. Secure Human-Computer Identification against peeping attacks (SecHCI): A survey. Technical report, 2003. http:\/\/www.hooklee.com\/Papers\/SecHCI-Survey.pdf."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009894418895"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of EuroHaptics'2006","author":"Malek B.","year":"2006","unstructured":"B. Malek , M. Orozco and A. El Saddik . Novel shoulder-surfing resistant haptic-based graphical password , In Proceedings of EuroHaptics'2006 , 179--184, EuroHaptics Society , 2006 . B. Malek, M. Orozco and A. El Saddik. Novel shoulder-surfing resistant haptic-based graphical password, In Proceedings of EuroHaptics'2006, 179--184, EuroHaptics Society, 2006."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238190"},{"key":"e_1_3_2_1_38_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT'91","author":"Matsumoto T.","year":"1991","unstructured":"T. Matsumoto and H. Imai . Human identification through insecure channel . In Advances in Cryptology - EUROCRYPT'91 , Volume 547 of Lecture Notes in Computer Science , 409--421, Springer , 1991 . T. Matsumoto and H. Imai. Human identification through insecure channel. In Advances in Cryptology - EUROCRYPT'91, Volume 547 of Lecture Notes in Computer Science, 409--421, Springer, 1991."},{"key":"e_1_3_2_1_39_1","volume-title":"Handbook of Applied Cryptography","author":"Menezes A. J.","year":"1996","unstructured":"A. J. Menezes , P. C. van Oorschot and S. A. Vanstone . Handbook of Applied Cryptography . CRC Press , 1996 . A. J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996."},{"key":"e_1_3_2_1_40_1","unstructured":"Passfaces Corporation. Passfaces: Two Factor Authentication for the Enterprise. http:\/\/www.passfaces.com last visited on 6th June 2011.  Passfaces Corporation. Passfaces: Two Factor Authentication for the Enterprise. http:\/\/www.passfaces.com last visited on 6th June 2011."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_29"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357085"},{"key":"e_1_3_2_1_44_1","volume-title":"The Rutgers Scholar","volume":"4","author":"Sobrado L.","year":"2002","unstructured":"L. Sobrado and J. C. Birget . Graphical passwords . The Rutgers Scholar , vol. 4 , 2002 . L. Sobrado and J. C. Birget. Graphical passwords. The Rutgers Scholar, vol. 4, 2002."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_1_46_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology -- EUROCRYPT'95","author":"Wang C.-H.","year":"1995","unstructured":"C.-H. Wang , T. Hwang and J.-J. Tsai . On the Matsumoto and Imai's human identification scheme . In Advances in Cryptology -- EUROCRYPT'95 , Volume 921 of Lecture Notes in Computer Science , 382--392, Springer , 1995 . C.-H. Wang, T. Hwang and J.-J. Tsai. On the Matsumoto and Imai's human identification scheme. In Advances in Cryptology -- EUROCRYPT'95, Volume 921 of Lecture Notes in Computer Science, 382--392, Springer, 1995."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.10"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.317"}],"event":{"name":"SOUPS '11: Symposium On Usable Privacy and Security","sponsor":["Carnegie Mellon CyLab","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Pittsburgh Pennsylvania","acronym":"SOUPS '11"},"container-title":["Proceedings of the Seventh Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2078827.2078834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078834"}},"subtitle":["exploiting design flaws and nonuniform human behavior"],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":48,"alternative-id":["10.1145\/2078827.2078834","10.1145\/2078827"],"URL":"https:\/\/doi.org\/10.1145\/2078827.2078834","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}