{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:06:29Z","timestamp":1776107189731,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Royal Society of Edinburgh","award":["1931"],"award-info":[{"award-number":["1931"]}]},{"name":"DFG","award":["316457582 and 425869382"],"award-info":[{"award-number":["316457582 and 425869382"]}]},{"name":"PETRAS National Centre of Excellence for IoT Systems Cybersecurity, which has been funded by the UK","award":["EPSRC under grant number EP\/S035362\/1"],"award-info":[{"award-number":["EPSRC under grant number EP\/S035362\/1"]}]},{"name":"dtec.bw-Digitalization and Technology Research Center of the Bundeswehr","award":["(Voice of Wisdom)"],"award-info":[{"award-number":["(Voice of Wisdom)"]}]},{"DOI":"10.13039\/501100004350","name":"Studienstiftung des Deutschen Volkes","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004350","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EPSRC New Investigator Award","award":["(EP\/V008870\/1)"],"award-info":[{"award-number":["(EP\/V008870\/1)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1145\/3531073.3531106","type":"proceedings-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T20:42:17Z","timestamp":1654548137000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Understanding Shoulder Surfer Behavior and Attack Patterns Using Virtual Reality"],"prefix":"10.1145","author":[{"given":"Yasmeen","family":"Abdrabou","sequence":"first","affiliation":[{"name":"Bundeswehr University Munich, Germany and University of Glasgow, United Kingdom"}]},{"given":"Sheikh Radiah","family":"Rivu","sequence":"additional","affiliation":[{"name":"University des Bundeswehr, Germany"}]},{"given":"Tarek","family":"Ammar","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany"}]},{"given":"Jonathan","family":"Liebers","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, Germany, Germany"}]},{"given":"Alia","family":"Saad","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, Germany, Germany"}]},{"given":"Carina","family":"Liebers","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, Germany, Germany"}]},{"given":"Uwe","family":"Gruenefeld","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, Germany, Germany"}]},{"given":"Pascal","family":"Knierim","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Germany"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Ville","family":"Makela","sequence":"additional","affiliation":[{"name":"Design and Business, University of Waterloo, Waterloo, Ontario, Canada"}]},{"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, Germany, Germany"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Understanding Shoulder Surfer Behavior Using Virtual Reality. In Adjunct Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces.","author":"Abdrabou Yasmeen","year":"2022","unstructured":"Yasmeen Abdrabou, Radiah Rivu, Tarek Ammar, Jonathan Liebers, Alia Saad, Carina Liebers, Uwe Gruenefeld, Pascal Knierim, Mohamed Khamis, Ville Maekelae, Stefan Schneegass, and Florian Alt. 2022. Understanding Shoulder Surfer Behavior Using Virtual Reality. In Adjunct Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2019-0019"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134609"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775109"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0090"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979095"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102023"},{"key":"e_1_3_2_1_8_1","volume-title":"IFIP TC 13 International Conference on Human-Computer Interaction, 1st - 5th","author":"Brignull Harry","year":"2003","unstructured":"Harry Brignull and Yvonne Rogers. 2003. Enticing people to interact with large public displays in public spaces. In Human-computer interaction - INTERACT \u201903: IFIP TC 13 International Conference on Human-Computer Interaction, 1st - 5th September 2003, Zurich, Switzerland, Vol.\u00a03. IOS Press, Amsterdam and Berlin."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611009.2611028"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNE.2013.6512317"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_13_1","volume-title":"Mensch Und Computer 2021 (Ingolstadt, Germany) (MuC \u201921)","author":"Farzand Habiba","unstructured":"Habiba Farzand, Kinshuk Bhardwaj, Karola Marky, and Mohamed Khamis. 2021. The Interplay between Personal Relationships & Shoulder Surfing Mitigation. In Mensch Und Computer 2021 (Ingolstadt, Germany) (MuC \u201921). Association for Computing Machinery, New York, NY, USA, 338\u2013343."},{"key":"e_1_3_2_1_14_1","volume-title":"The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions","author":"Katsini Christina","unstructured":"Christina Katsini, Yasmeen Abdrabou, George\u00a0E. Raptis, Mohamed Khamis, and Florian Alt. 2020. The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions. Association for Computing Machinery, New York, NY, USA, 1\u201321."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287052"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307671"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1824795.1824798"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376796"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300819"},{"key":"e_1_3_2_1_20_1","volume-title":"Fidelity on Identifying Interactions","author":"Mathis Florian","year":"2021","unstructured":"Florian Mathis, Kami Vaniea, and Mohamed Khamis. 2021. Observing Virtual Avatars: The Impact of Avatars\u2019 Fidelity on Identifying Interactions. In Academic Mindtrek 2021 (Tampere\/Virtual, Finland) (Mindtrek 2021). Association for Computing Machinery, New York, NY, USA, 154\u2013164."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445478"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874203"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472617"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107289"},{"key":"e_1_3_2_1_26_1","first-page":"439","article-title":"A survey of password attacks and comparative analysis on methods for secure authentication","volume":"19","author":"Raza Mudassar","year":"2012","unstructured":"Mudassar Raza, Muhammad Iqbal, Muhammad Sharif, and Waqas Haider. 2012. A survey of password attacks and comparative analysis on methods for secure authentication. World Applied Sciences Journal 19, 4 (2012), 439\u2013444.","journal-title":"World Applied Sciences Journal"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/21582440211040076"},{"key":"e_1_3_2_1_29_1","volume-title":"The use of virtual reality in the study of people\u2019s responses to violent incidents. Frontiers in behavioral neuroscience 3","author":"Rovira Aitor","year":"2009","unstructured":"Aitor Rovira, David Swapp, Bernhard Spanlang, and Mel Slater. 2009. The use of virtual reality in the study of people\u2019s responses to violent incidents. Frontiers in behavioral neuroscience 3 (2009), 59."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282919"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282919"},{"key":"e_1_3_2_1_33_1","volume-title":"Identifying Smartphones Shoulder Surfing Through Gaze Estimation. In ACM Symposium on Eye Tracking Research and Applications","author":"Saad Alia","year":"2020","unstructured":"Alia Saad, Dina\u00a0Hisham Elkafrawy, Slim Abdennadher, and Stefan Schneegass. 2020. Are They Actually Looking? Identifying Smartphones Shoulder Surfing Through Gaze Estimation. In ACM Symposium on Eye Tracking Research and Applications (Stuttgart, Germany) (ETRA \u201920 Adjunct). Association for Computing Machinery, New York, NY, USA, Article 42, 3\u00a0pages."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447526.3472058"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/355017.355028"},{"key":"e_1_3_2_1_36_1","article-title":"Eye, Head and Torso Coordination During Gaze Shifts in Virtual Reality","volume":"27","author":"Sidenmark Ludwig","year":"2019","unstructured":"Ludwig Sidenmark and Hans Gellersen. 2019. Eye, Head and Torso Coordination During Gaze Shifts in Virtual Reality. ACM Trans. Comput.-Hum. Interact. 27, 1, Article 4 (Dec. 2019), 40\u00a0pages.","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"e_1_3_2_1_37_1","volume-title":"SwiPIN: Fast and Secure PIN-Entry on Smartphones","author":"von Zezschwitz Emanuel","unstructured":"Emanuel von Zezschwitz, Alexander De\u00a0Luca, Bruno Brunkow, and Heinrich Hussmann. 2015. SwiPIN: Fast and Secure PIN-Entry on Smartphones. Association for Computing Machinery, New York, NY, USA, 1403\u20131406."},{"key":"e_1_3_2_1_38_1","volume-title":"SIGGRAPH Asia 2012 Emerging Technologies","author":"Watanabe Keita","unstructured":"Keita Watanabe, Fumito Higuchi, Masahiko Inami, and Takeo Igarashi. 2012. CursorCamouflage: Multiple Dummy Cursors as a Defense against Shoulder Surfing. In SIGGRAPH Asia 2012 Emerging Technologies. Association for Computing Machinery, New York, NY, USA, 1\u20132."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23007"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1162\/105474698565686"},{"key":"e_1_3_2_1_41_1","volume-title":"Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass","author":"Yadav Dhruv\u00a0Kumar","unstructured":"Dhruv\u00a0Kumar Yadav, Beatrice Ionascu, Sai\u00a0Vamsi Krishna\u00a0Ongole, Aditi Roy, and Nasir Memon. 2015. Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass. In Financial Cryptography and Data Security, Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 281\u2013297."}],"event":{"name":"AVI 2022: International Conference on Advanced Visual Interfaces","location":"Frascati, Rome Italy","acronym":"AVI 2022"},"container-title":["Proceedings of the 2022 International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531073.3531106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531073.3531106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:27Z","timestamp":1750186827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531073.3531106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":40,"alternative-id":["10.1145\/3531073.3531106","10.1145\/3531073"],"URL":"https:\/\/doi.org\/10.1145\/3531073.3531106","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}