{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:35:45Z","timestamp":1773930945300,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134609","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"486-498","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Towards Baselines for Shoulder Surfing on Mobile Authentication"],"prefix":"10.1145","author":[{"given":"Adam J.","family":"Aviv","sequence":"first","affiliation":[{"name":"United States Naval Academy"}]},{"given":"John T.","family":"Davin","sequence":"additional","affiliation":[{"name":"United States Naval Academy"}]},{"given":"Flynn","family":"Wolf","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County"}]},{"given":"Ravi","family":"Kuber","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.9776\/16141"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818014"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664253"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 2010 Workshop on Offensive Technology (WOOT'10)","author":"Aviv Adam J","year":"2010","unstructured":"Adam J Aviv , Katherine Gibson , Evan Mossop , Matt Blaze , and Jonathan M Smith . 2010 . Smudge Attacks on Smartphone Touch Screens . In Proceedings of the 2010 Workshop on Offensive Technology (WOOT'10) . 1--7. Adam J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. 2010. Smudge Attacks on Smartphone Touch Screens. In Proceedings of the 2010 Workshop on Offensive Technology (WOOT'10). 1--7."},{"key":"e_1_3_2_1_7_1","volume-title":"Lorrie Faith Cranor, and Marios Savvides.","author":"Bhagavatula Chandrasekhar","year":"2015","unstructured":"Chandrasekhar Bhagavatula , Blase Ur , Kevin Iacovino , Su Mon Kywe , Lorrie Faith Cranor, and Marios Savvides. 2015 . Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption . (2015). Chandrasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, and Marios Savvides. 2015. Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption. (2015)."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of HCI Korea. Hanbit Media, Inc., 7--11","author":"Bianchi Andrea","year":"2014","unstructured":"Andrea Bianchi and Ian Oakley . 2014 . Multiplexed input to protect against casual observers . In Proceedings of HCI Korea. Hanbit Media, Inc., 7--11 . Andrea Bianchi and Ian Oakley. 2014. Multiplexed input to protect against casual observers. In Proceedings of HCI Korea. Hanbit Media, Inc., 7--11."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Joseph Bonneau S\u00f6ren Preibusch and Ross Anderson. 2012. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. 25--40.  Joseph Bonneau S\u00f6ren Preibusch and Ross Anderson. 2012. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. 25--40.","DOI":"10.1007\/978-3-642-32946-3_3"},{"key":"e_1_3_2_1_10_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Cherapau Ivan","year":"2015","unstructured":"Ivan Cherapau , Ildar Muslukhov , Nalin Asanka , and Konstantin Beznosov . 2015 . On the impact of touch id on iphone passcodes . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 257--276. Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the impact of touch id on iphone passcodes. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 257--276."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753490"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518840"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025835"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660273"},{"key":"e_1_3_2_1_18_1","volume-title":"Apple to require 6-digit passcodes on newer iPhones, iPads under iOS 9:Stronger passcode ups the ante: there will be one million possible permutations. (Jun 8","author":"Farivar Cyrus","year":"2015","unstructured":"Cyrus Farivar . Jun 8, 2015. Apple to require 6-digit passcodes on newer iPhones, iPads under iOS 9:Stronger passcode ups the ante: there will be one million possible permutations. (Jun 8 , 2015 ). http:\/\/arstechnica.com\/apple\/2015\/06\/apple-to-require-6-digit-passcodes-on-newer-iphones-ipads-under-ios-9\/. Cyrus Farivar. Jun 8, 2015. Apple to require 6-digit passcodes on newer iPhones, iPads under iOS 9:Stronger passcode ups the ante: there will be one million possible permutations. (Jun 8, 2015). http:\/\/arstechnica.com\/apple\/2015\/06\/apple-to-require-6-digit-passcodes-on-newer-iphones-ipads-under-ios-9\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2010.34"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1968613.1968647"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.78"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2270227"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. EuroHaptics","volume":"6","author":"Malek Behzad","year":"2006","unstructured":"Behzad Malek , Mauricio Orozco , and Abdulmotaleb El Saddik . 2006 . Novel shoulder-surfing resistant haptic-based graphical password . In Proc. EuroHaptics , Vol. 6 . Behzad Malek, Mauricio Orozco, and Abdulmotaleb El Saddik. 2006. Novel shoulder-surfing resistant haptic-based graphical password. In Proc. EuroHaptics, Vol. 6."},{"key":"e_1_3_2_1_28_1","unstructured":"Shushuang Man Dawei Hong and Manton M Matthews. 2003. A Shoulder-Surfing Resistant Graphical Password Scheme-WIW. (2003) 105--111 pages.  Shushuang Man Dawei Hong and Manton M Matthews. 2003. A Shoulder-Surfing Resistant Graphical Password Scheme-WIW. (2003) 105--111 pages."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858384"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208352"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594375"},{"key":"e_1_3_2_1_35_1","article-title":"iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id","volume":"3","author":"Tipton Stephen J","year":"2014","unstructured":"Stephen J Tipton , Daniel J White II, Christopher Sershon , and Young B Choi . 2014 . iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id . International Journal of Computer and Information Technology 3 , 03 (2014). Stephen J Tipton, Daniel J White II, Christopher Sershon, and Young B Choi. 2014. iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id. International Journal of Computer and Information Technology 3, 03 (2014).","journal-title":"International Journal of Computer and Information Technology"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.008"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702202"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012709.3012729"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_3_2_1_44_1","volume-title":"Pitfalls of Shoulder Surfing Studies. In NDSS Workshop on Usable Security. 1--6.","author":"Wiese Oliver","year":"2015","unstructured":"Oliver Wiese and Volker Roth . 2015 . Pitfalls of Shoulder Surfing Studies. In NDSS Workshop on Usable Security. 1--6. Oliver Wiese and Volker Roth. 2015. Pitfalls of Shoulder Surfing Studies. In NDSS Workshop on Usable Security. 1--6."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078835"},{"key":"e_1_3_2_1_46_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Zhao Ziming","year":"2013","unstructured":"Ziming Zhao , Gail-Joon Ahn , Jeong-Jin Seo , and Hongxin Hu . 2013 . On the security of picture gesture authentication . In 22nd USENIX Security Symposium (USENIX Security 13) . 383--398. Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, and Hongxin Hu. 2013. On the security of picture gesture authentication. In 22nd USENIX Security Symposium (USENIX Security 13). 383--398."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134609","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134609"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":46,"alternative-id":["10.1145\/3134600.3134609","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134609","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}