{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:36:14Z","timestamp":1773930974821,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,27]],"date-time":"2022-11-27T00:00:00Z","timestamp":1669507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006533","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/V008870\/1, EP\/S035362\/1"],"award-info":[{"award-number":["EP\/V008870\/1, EP\/S035362\/1"]}],"id":[{"id":"10.13039\/100006533","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,27]]},"DOI":"10.1145\/3568444.3568450","type":"proceedings-article","created":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T15:42:17Z","timestamp":1672328537000},"page":"83-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["PIN Scrambler: Assessing the Impact of Randomized Layouts on the Usability and Security of PINs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3798-6726","authenticated-orcid":false,"given":"Daniel","family":"Kirkwood","sequence":"first","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4224-7963","authenticated-orcid":false,"given":"Cagdas","family":"Tombul","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7398-2605","authenticated-orcid":false,"given":"Calum","family":"Firth","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2564-238X","authenticated-orcid":false,"given":"Finn","family":"Macdonald","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7906-1102","authenticated-orcid":false,"given":"Konstantinos","family":"Priftis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1690-3410","authenticated-orcid":false,"given":"Florian","family":"Mathis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7051-5200","authenticated-orcid":false,"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399715.3399819"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85610-6_41"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319837"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563693"},{"key":"e_1_3_2_1_6_1","volume-title":"Emerging trends in usable security and privacy. i-com 18, 3","author":"Alt Florian","year":"2019","unstructured":"Florian Alt and Emanuel von Zezschwitz . 2019. Emerging trends in usable security and privacy. i-com 18, 3 ( 2019 ), 189\u2013195. Florian Alt and Emanuel von Zezschwitz. 2019. Emerging trends in usable security and privacy. i-com 18, 3 (2019), 189\u2013195."},{"key":"e_1_3_2_1_7_1","volume-title":"4th USENIX Workshop on Offensive Technologies (WOOT 10)","author":"Aviv J","year":"2010","unstructured":"Adam\u00a0 J Aviv , Katherine Gibson , Evan Mossop , Matt Blaze , and Jonathan\u00a0 M Smith . 2010 . Smudge attacks on smartphone touch screens . In 4th USENIX Workshop on Offensive Technologies (WOOT 10) . Adam\u00a0J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan\u00a0M Smith. 2010. Smudge attacks on smartphone touch screens. In 4th USENIX Workshop on Offensive Technologies (WOOT 10)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546706"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102023"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556262.1556312"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152832.3152851"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287052"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Taekyoung Kwon and Sarang Na. 2014. TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems. computers & security 42(2014) 137\u2013150.  Taekyoung Kwon and Sarang Na. 2014. TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems. computers & security 42(2014) 137\u2013150.","DOI":"10.1016\/j.cose.2013.12.001"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531087"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.1949134"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 5th USENIX conference on Offensive technologies. 6\u20136.","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery , Sarah Meiklejohn , and Stefan Savage . 2011 . Heat of the moment: Characterizing the efficacy of thermal camera-based attacks . In Proceedings of the 5th USENIX conference on Offensive technologies. 6\u20136. Keaton Mowery, Sarah Meiklejohn, and Stefan Savage. 2011. Heat of the moment: Characterizing the efficacy of thermal camera-based attacks. In Proceedings of the 5th USENIX conference on Offensive technologies. 6\u20136."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of the 10th IASTED International Conference on Software Engineering and Applications (SEA","author":"Oladimeji A","year":"2006","unstructured":"Ebenezer\u00a0 A Oladimeji , Sam Supakkul , and Lawrence Chung . 2006 . Security threat modeling and analysis: A goal-oriented approach . In Proc. of the 10th IASTED International Conference on Software Engineering and Applications (SEA 2006). Citeseer, 13\u201315. Ebenezer\u00a0A Oladimeji, Sam Supakkul, and Lawrence Chung. 2006. Security threat modeling and analysis: A goal-oriented approach. In Proc. of the 10th IASTED International Conference on Software Engineering and Applications (SEA 2006). Citeseer, 13\u201315."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378727.1389971"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449432"}],"event":{"name":"MUM 2022: 21th International Conference on Mobile and Ubiquitous Multimedia","location":"Lisbon Portugal","acronym":"MUM 2022"},"container-title":["Proceedings of the 21st International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568444.3568450","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568444.3568450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:34Z","timestamp":1750182694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568444.3568450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,27]]},"references-count":24,"alternative-id":["10.1145\/3568444.3568450","10.1145\/3568444"],"URL":"https:\/\/doi.org\/10.1145\/3568444.3568450","relation":{},"subject":[],"published":{"date-parts":[[2022,11,27]]},"assertion":[{"value":"2022-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}