{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T12:00:22Z","timestamp":1769860822864,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3539011","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays"],"prefix":"10.1145","author":[{"given":"Reyhan","family":"D\u00fczg\u00fcn","sequence":"first","affiliation":[{"name":"SECUSO Research Group, Karlsruhe Institute of Technology, Germany"}]},{"given":"Naheem","family":"Noah","sequence":"additional","affiliation":[{"name":"University of Denver, United States"}]},{"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"University of Denver, United States"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131904"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Ronald\u00a0T Azuma. 1997. A survey of augmented reality. Presence: teleoperators & virtual environments 6 4(1997) 355\u2013385.","DOI":"10.1162\/pres.1997.6.4.355"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21175967"},{"key":"e_1_3_2_1_4_1","volume-title":"Google Glass. In Proc. of the Symposium on Usable Privacy and Security. Citeseer","author":"Bailey V","year":"2014","unstructured":"Daniel\u00a0V Bailey, Markus D\u00fcrmuth, and Christof Paar. 2014. \u201cTyping\u201d passwords with voice recognition: How to authenticate to Google Glass. In Proc. of the Symposium on Usable Privacy and Security. Citeseer, Citeseer, CA, USA, 1\u20132."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.03.018"},{"key":"e_1_3_2_1_6_1","volume-title":"The quest to replace passwords: A framework for comparative evaluation of web authentication schemes","author":"Bonneau Joseph","unstructured":"Joseph Bonneau, Cormac Herley, Paul\u00a0C Van\u00a0Oorschot, and Frank Stajano. 2012. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In SOUPS. IEEE, CA, USA, 553\u2013567."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556262.1556312"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_9_1","volume-title":"WAY Workshop. WAY, Virtual, 1\u20136.","author":"Duezguen Reyhan","year":"2020","unstructured":"Reyhan Duezguen, Peter Mayer, Sanchari Das, and Melanie Volkamer. 2020. Towards secure and usable authentication for augmented and virtual reality head-mounted displays. In WAY Workshop. WAY, Virtual, 1\u20136."},{"key":"e_1_3_2_1_10_1","volume-title":"Security and privacy in a middleware for large scale mobile and pervasive augmented reality. In 2007 15th SOFTCOM","author":"Ferreira Pedro","unstructured":"Pedro Ferreira, Jo\u00e3o Orvalho, and Fernando Boavida. 2007. Security and privacy in a middleware for large scale mobile and pervasive augmented reality. In 2007 15th SOFTCOM. IEEE, Croatia, 1\u20135."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Rainhard\u00a0Dieter Findling Tahmid Quddus and Stephan Sigg. 2019. Hide my gaze with EOG! towards closed-eye gaze gesture passwords that resist observation-attacks with electrooculography in smart glasses. In MoMM. ACM USA 107\u2013116.","DOI":"10.1145\/3365921.3365922"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Eira Fristr\u00f6m Elias Lius Niki Ulmanen Paavo Hietala Pauliina K\u00e4rkk\u00e4inen Tommi M\u00e4kinen Stephan Sigg and Rainhard\u00a0Dieter Findling. 2019. Free-Form Gaze Passwords from Cameras Embedded in Smart Glasses. In MoMM. ACM USA 136\u2013144.","DOI":"10.1145\/3365921.3365928"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312959"},{"key":"e_1_3_2_1_14_1","volume-title":"TrustED. ACM","author":"Gaebel Ethan","unstructured":"Ethan Gaebel, Ning Zhang, Wenjing Lou, and Y\u00a0Thomas Hou. 2016. Looks good to me: Authentication for augmented reality. In TrustED. ACM, NY, USA, 57\u201367."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2016.7529679"},{"key":"e_1_3_2_1_16_1","volume-title":"Text entry in immersive head-mounted display-based virtual reality using standard keyboards","author":"Grubert Jens","unstructured":"Jens Grubert, Lukas Witzani, Eyal Ofek, Michel Pahud, Matthias Kranz, and Per\u00a0Ola Kristensson. 2018. Text entry in immersive head-mounted display-based virtual reality using standard keyboards. In VR. IEEE, Germany, 159\u2013166."},{"key":"e_1_3_2_1_17_1","volume-title":"Extended Abstracts of CHI. ACM","author":"Gugenheimer Jan","unstructured":"Jan Gugenheimer, Christian Mai, Mark McGill, Julie Williamson, Frank Steinicke, and Ken Perlin. 2019. Challenges using head-mounted displays in shared and social spaces. In Extended Abstracts of CHI. ACM, NY, USA, 1\u20138."},{"key":"e_1_3_2_1_18_1","volume-title":"EuroS&P","author":"Gutmann Andreas","unstructured":"Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, and J\u00f6rn M\u00fcller-Quade. 2016. Zeta-zero-trust authentication: Relying on innate human ability, not technology. In EuroS&P. IEEE, Germany, 357\u2013371."},{"key":"e_1_3_2_1_19_1","volume-title":"Extended Abstracts of the 2019 CHI. ACM","author":"Hadjidemetriou George","unstructured":"George Hadjidemetriou, Marios Belk, Christos Fidas, and Andreas Pitsillides. 2019. Picture passwords in mixed reality: Implementation and evaluation. In Extended Abstracts of the 2019 CHI. ACM, NY, USA, 1\u20136."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196543"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174910.3174936"},{"key":"e_1_3_2_1_22_1","first-page":"67","article-title":"Survey on authentication password techniques","volume":"3","author":"Jadhao Priti","year":"2013","unstructured":"Priti Jadhao and Lalit Dole. 2013. Survey on authentication password techniques. IJSCE 3, 2 (2013), 67\u201368.","journal-title":"IJSCE"},{"key":"e_1_3_2_1_23_1","volume-title":"A literature review on virtual reality authentication","author":"Jones M","unstructured":"John\u00a0M Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, and Sanchari Das. 2021. A literature review on virtual reality authentication. In HAISA. Springer, Cham, 189\u2013198."},{"key":"e_1_3_2_1_24_1","volume-title":"MobiSys. ACM","author":"Khan Hassan","unstructured":"Hassan Khan, Urs Hengartner, and Daniel Vogel. 2018. Augmented reality-based mimicry attacks on behaviour-based smartphone authentication. In MobiSys. ACM, NY, USA, 41\u201353."},{"key":"e_1_3_2_1_25_1","unstructured":"Akhil Khare Vinaya Kulkarni and Akhilesh Upadhayay. 2012. A Collaborative Augmented Reality System Based On Real Time Hand Gesture Recognition. In Global Journal of Computer Science and Technology. Global Journals US 47\u201351."},{"key":"e_1_3_2_1_26_1","volume-title":"IMCOM. ACM","author":"Kim Sung-Hwan","unstructured":"Sung-Hwan Kim, Jong-Woo Kim, Seon-Yeong Kim, and Hwan-Gue Cho. 2011. A new shoulder-surfing resistant password for mobile environments. In IMCOM. ACM, NY, USA, 1\u20138."},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"Procedures for performing systematic reviews. Keele, UK","volume":"33","author":"Kitchenham Barbara","year":"2004","unstructured":"Barbara Kitchenham. 2004. Procedures for performing systematic reviews. Keele, UK, Keele University 33, 2004 (2004), 1\u201326.","journal-title":"Keele University"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2473855"},{"key":"e_1_3_2_1_29_1","volume-title":"The Discoverability of Password Entry Using Virtual Keyboards in an Augmented Reality Wearable: An Initial Proof of Concept","author":"Kreider Christopher","unstructured":"Christopher Kreider. 2018. The Discoverability of Password Entry Using Virtual Keyboards in an Augmented Reality Wearable: An Initial Proof of Concept. In Southern Association for Information Systems. AISeL, UK, 1\u20136."},{"key":"e_1_3_2_1_30_1","unstructured":"Lingjun Li Xinxin Zhao and Guoliang Xue. 2013. Unobservable re-authentication for smartphones.. In NDSS Vol.\u00a056. NDSS USA 57\u201359."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013212"},{"key":"e_1_3_2_1_32_1","volume-title":"Leakage Resilient Password Systems","author":"Li Yingjiu","unstructured":"Yingjiu Li, Qiang Yan, and Robert\u00a0H Deng. 2015. ShadowKey: A Practical Leakage Resilient Password System. In Leakage Resilient Password Systems. Springer, Cham, 53\u201364."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Jonathan Liebers and Stefan Schneegass. 2020. Gaze-based Authentication in Virtual Reality. In ETRA. ACM USA 1\u20132.","DOI":"10.1145\/3379157.3391421"},{"key":"e_1_3_2_1_34_1","volume-title":"ACSAC. ACM","author":"Lu Duo","unstructured":"Duo Lu, Yuli Deng, and Dijiang Huang. 2021. Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication. In ACSAC. ACM, NY, USA, 468\u2013481."},{"key":"e_1_3_2_1_35_1","volume-title":"STAST. ACM","author":"Mayer Peter","unstructured":"Peter Mayer and Melanie Volkamer. 2018. Addressing misconceptions about password security effectively. In STAST. ACM, NY, USA, 16\u201327."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/cav.2020"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.180"},{"key":"e_1_3_2_1_38_1","first-page":"156","article-title":"Fingerprint Feature Extraction, Identification and Authentication: A Review","volume":"2","author":"Quraishi Farah\u00a0Fayaz","year":"2016","unstructured":"Farah\u00a0Fayaz Quraishi, Summera Ashraf, and Manzoor\u00a0Ahmad Chachoo. 2016. Fingerprint Feature Extraction, Identification and Authentication: A Review. IJRRMCSIT 2(2016), 156\u2013160. Issue 2.","journal-title":"IJRRMCSIT"},{"key":"e_1_3_2_1_39_1","first-page":"160","article-title":"Personal identification number entry for Google glass","volume":"63","author":"Seo Hwajeong","year":"2017","unstructured":"Hwajeong Seo, Jiye Kim, Howon Kim, and Zhe Liu. 2017. Personal identification number entry for Google glass. C&EE 63(2017), 160\u2013167.","journal-title":"C&EE"},{"key":"e_1_3_2_1_40_1","volume-title":"S&P","author":"Stephenson Sophie","unstructured":"Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, and Rahul Chatterjee. 2022. SoK: Authentication in Augmented and Virtual Reality. In S&P. IEEE Computer Society, USA, 1552\u20131552."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476589.1476686"},{"key":"e_1_3_2_1_42_1","volume-title":"Analyzing the past to prepare for the future: Writing a literature review. MIS quarterly 26, 2","author":"Webster Jane","year":"2002","unstructured":"Jane Webster and Richard\u00a0T Watson. 2002. Analyzing the past to prepare for the future: Writing a literature review. MIS quarterly 26, 2 (2002), xiii\u2013xxiii."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Oliver Wiese and Volker Roth. 2016. See you next time: A model for modern shoulder surfers. In MobileHCI. ACM Florence Italy 453\u2013464.","DOI":"10.1145\/2935334.2935388"},{"key":"e_1_3_2_1_44_1","volume-title":"Aditi Roy, and Nasir Memon.","author":"Yadav Dhruv\u00a0Kumar","year":"2015","unstructured":"Dhruv\u00a0Kumar Yadav, Beatrice Ionascu, Sai Vamsi\u00a0Krishna Ongole, Aditi Roy, and Nasir Memon. 2015. Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass. In FC. Springer, Germany, 281\u2013297."},{"key":"e_1_3_2_1_45_1","volume-title":"Yafeng Yin, and Qun Li.","author":"Yi Shanhe","year":"2016","unstructured":"Shanhe Yi, Zhengrui Qin, Ed Novak, Yafeng Yin, and Qun Li. 2016. Glassgesture: Exploring head gesture interface of smart glasses. In INFOCOM. IEEE, USA, 1\u20139."},{"key":"e_1_3_2_1_46_1","volume-title":"AugAuth: Shoulder-surfing resistant authentication for augmented reality","author":"Zhang Ruide","unstructured":"Ruide Zhang, Ning Zhang, Changlai Du, Wenjing Lou, Y\u00a0Thomas Hou, and Yuichi Kawamoto. 2017. AugAuth: Shoulder-surfing resistant authentication for augmented reality. In ICC. IEEE, Paris, France, 1\u20136."}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2022"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3539011","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3539011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:41Z","timestamp":1750183781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3539011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":46,"alternative-id":["10.1145\/3538969.3539011","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3539011","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}