{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:22Z","timestamp":1750309462531,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1845300"],"award-info":[{"award-number":["1845300"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3688459.3688461","type":"proceedings-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T08:31:55Z","timestamp":1732091515000},"page":"220-234","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["\"I'm going to try her birthday\": Investigating How Friends Guess Each Other's Smartphone Unlock PINs in the Lab"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7553-2009","authenticated-orcid":false,"given":"Elena","family":"Korkes","sequence":"first","affiliation":[{"name":"The George Washington University, Washington DC, United States of America,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1987-1685","authenticated-orcid":false,"given":"Collins W.","family":"Munyendo","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington DC, United States of America,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8399-4801","authenticated-orcid":false,"given":"Alvin","family":"Isaac","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington DC, United States of America,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3273-835X","authenticated-orcid":false,"given":"Victoria","family":"Hennemann","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington DC, United States of America,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3792-2485","authenticated-orcid":false,"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington DC, United States of America,"}]}],"member":"320","published-online":{"date-parts":[[2024,11,20]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_3_2_3_2","series-title":"(SOUPS\u00a0\u201917)","first-page":"49","volume-title":"Symposium on Usable Privacy and Security","author":"Albayram Yusuf","year":"2017","unstructured":"Yusuf Albayram, Mohammad Maifi\u00a0Hasan Khan, Theodore Jensen, and Nhan Nguyen. 2017. \u201c...better to use a lock screen than to worry about saving a few seconds of time\u201d: Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201917). USENIX, Santa Clara, California, USA, 49\u201363."},{"key":"e_1_3_3_2_4_2","unstructured":"Daniel Amitay. 2011. Most Common iPhone Passcodes. http:\/\/danielamitay.com\/blog\/2011\/6\/13\/most-common-iphone-passcodes as of 2024\/08\/27 09:51:58."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Panagiotis Andriotis George Oikonomou Alexios Mylonas and Theo Tryfonas. 2016. A Study on Usability and Security Features of the Android Pattern Lock Screen. Information and Computer Security 24 1 (March 2016) 53\u201372.","DOI":"10.1108\/ICS-01-2015-0001"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_11"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"},{"key":"e_1_3_3_2_8_2","series-title":"(ACSAC\u00a0\u201915)","first-page":"301","volume-title":"Annual Computer Security Applications Conference","author":"Aviv Adam\u00a0J.","year":"2015","unstructured":"Adam\u00a0J. Aviv, Devon Budzitowski, and Ravi Kuber. 2015. Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android\u2019s Pattern Unlock. In Annual Computer Security Applications Conference(ACSAC\u00a0\u201915). ACM, Los Angeles, California, USA, 301\u2013310."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134609"},{"key":"e_1_3_3_2_10_2","series-title":"(WOOT\u00a0\u201910)","first-page":"1","volume-title":"USENIX Workshop on Offensive Technologies","author":"Aviv Adam\u00a0J.","year":"2010","unstructured":"Adam\u00a0J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan\u00a0M. Smith. 2010. Smudge Attacks on Smartphone Touch Screens. In USENIX Workshop on Offensive Technologies(WOOT\u00a0\u201910). USENIX, Washington, District of Columbia, USA, 1\u20137."},{"key":"e_1_3_3_2_11_2","series-title":"(ACSAC\u00a0\u201918)","first-page":"453","volume-title":"Annual Conference on Computer Security Applications","author":"Aviv Adam\u00a0J.","year":"2018","unstructured":"Adam\u00a0J. Aviv, Flynn Wolf, and Ravi Kuber. 2018. Comparing Video Based Shoulder Surfing with Live Simulation and Towards Baselines for Shoulder Surfing on Mobile Authentication. In Annual Conference on Computer Security Applications(ACSAC\u00a0\u201918). ACM, San Juan, Puerto Rico, USA, 453\u2013466."},{"key":"e_1_3_3_2_12_2","volume-title":"Proc. EuroUSEC","author":"Bailey Daniel\u00a0V","year":"2023","unstructured":"Daniel\u00a0V Bailey, Collins\u00a0W Munyendo, Hunter\u00a0A Dyer, Miles Grant, Philipp Markert, and Adam\u00a0J Aviv. 2023. \u201cSomeone Definitely Used 0000\u201d\u2019: Strategies, Performance, and User Perception of Novice Smartphone-Unlock PIN-Guessers. In Proc. EuroUSEC."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Joseph Bonneau Cormac Herley Paul\u00a0C Van\u00a0Oorschot and Frank Stajano. 2015. Passwords and the evolution of imperfect authentication. Commun. ACM 58 7 78\u201387.","DOI":"10.1145\/2699390"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_3"},{"key":"e_1_3_3_2_15_2","series-title":"(WAY\u00a0\u201920)","first-page":"1","volume-title":"Who Are You?! Adventures in Authentication Workshop","author":"Casimiro Maria","year":"2020","unstructured":"Maria Casimiro, Joe Segel, Lewei Li, Yigeng Wang, and Lorrie\u00a0Faith Cranor. 2020. A Quest for Inspiration: How Users Create and Reuse PINs. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201920). Virtual Conference, 1\u20137."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"e_1_3_3_2_17_2","series-title":"(CHI\u00a0\u201914)","first-page":"2937","volume-title":"ACM Conference on Human Factors in Computing Systems","author":"De\u00a0Luca Alexander","year":"2014","unstructured":"Alexander De\u00a0Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard\u00a0Ewald Slawik, Heinrich Hussmann, and Matthew Smith. 2014. Now You See Me, Now You Don\u2019t: Protecting Smartphone Authentication from Shoulder Surfers. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201914). ACM, Toronto, Ontario, Canada, 2937\u20132946."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660273"},{"key":"e_1_3_3_2_19_2","unstructured":"Federal Trade Commission. 2022. How to Protect Your Phone from Hackers. https:\/\/consumer.ftc.gov\/articles\/how-protect-your-phone-hackers"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Ma\u0142gorzata Figurska Maciej Sta\u0144czyk and Kamil Kulesza. 2008. Humans cannot consciously generate random numbers sequences: Polemic study. Medical hypotheses 70 1 (2008) 182\u2013185.","DOI":"10.1016\/j.mehy.2007.06.038"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23001"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00100"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Philipp Markert Daniel\u00a0V. Bailey Maximilian Golla Markus D\u00fcrmuth and Adam\u00a0J. Aviv. 2021. On the Security of Smartphone Unlock PINs. ACM Transactions on Privacy and Security 24 4 (Nov. 2021) 30:1\u201330:36.","DOI":"10.1145\/3473040"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and Inter-Rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proc. ACM Hum.-Comput. Interact. Article 72 (2019) 23\u00a0pages.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858384"},{"key":"e_1_3_3_2_26_2","series-title":"(SOUPS\u00a0\u201921)","first-page":"37","volume-title":"Symposium on Usable Privacy and Security","author":"Munyendo Collins\u00a0W.","year":"2021","unstructured":"Collins\u00a0W. Munyendo, Miles Grant, Philipp Markert, Timothy\u00a0J. Forman, and Adam\u00a0J. Aviv. 2021. Using a Blocklist to Improve the Security of User Selection of Android Patterns. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921). USENIX, Virtual Conference, 37\u201356."},{"key":"e_1_3_3_2_27_2","series-title":"(SSYM\u00a0\u201922)","volume-title":"USENIX Security Symposium","author":"Munyendo Collins\u00a0W.","year":"2022","unstructured":"Collins\u00a0W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, and Adam\u00a0J. Aviv. 2022. \u201cThe Same PIN, Just Longer\u201d: On the (In)Security of Upgrading PINs from 4 to 6 Digits. In USENIX Security Symposium(SSYM\u00a0\u201922). USENIX, Boston, Massachusetts, USA."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00056"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.4135\/9781446282243.n20"},{"key":"e_1_3_3_2_30_2","series-title":"(SOUPS\u00a0\u201920)","first-page":"37","volume-title":"Symposium on Usable Privacy and Security","author":"Samuel Raina","year":"2020","unstructured":"Raina Samuel, Philipp Markert, Adam\u00a0J. Aviv, and Iulian Neamtiu. 2020. Knock, Knock. Who\u2019s There? On the Security of LG\u2019s Knock Codes. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201920). ACM, Virtual Conference, 37\u201359."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702202"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3012709.3012729"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176332"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053031"}],"event":{"name":"EuroUSEC 2024: The 2024 European Symposium on Usable Security","acronym":"EuroUSEC 2024","location":"Karlstad Sweden"},"container-title":["Proceedings of the 2024 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688459.3688461","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688459.3688461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:29Z","timestamp":1750295429000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688459.3688461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":35,"alternative-id":["10.1145\/3688459.3688461","10.1145\/3688459"],"URL":"https:\/\/doi.org\/10.1145\/3688459.3688461","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}