Page 349 - 《软件学报》2025年第5期
P. 349

周满 等: 基于声感知的移动终端身份认证综述                                                          2249


                 [35]  Yan Q, Han J, Li YJ, Zhou JY, Deng RH. Designing leakage-resilient password entry on touchscreen mobile devices. In: Proc. of the 8th
                      ACM SIGSAC Symp. on Information, Computer and Communications Security. Hangzhou: ACM, 2013. 37–48. [doi: 10.1145/2484313.
                      2484318]
                 [36]  Li ZJ, Li M, Mohapatra P, Han JS, Chen SY. iType: Using eye gaze to enhance typing privacy. In: Proc. of the 2017 IEEE Conf. on
                      Computer Communications. Atlanta: IEEE, 2017. 1–9. [doi: 10.1109/INFOCOM.2017.8057233]
                 [37]  Alsuhibany  SA.  A  camouflage  text-based  password  approach  for  mobile  devices  against  shoulder-surfing  attack.  Security  and
                      Communication Networks, 2021, 2021: 6653076. [doi: 10.1155/2021/6653076]
                 [38]  Mayer  P,  Gerber  N,  Reinheimer  B,  Rack  P,  Braun  K,  Volkamer  M.  I  (don’t)  see  what  you  typed  there!  Shoulder-surfing  resistant
                      password entry on gamepads. In: Proc. of the 2019 CHI Conf. on Human Factors in Computing Systems. Glasgow: ACM, 2019. 549.
                      [doi: 10.1145/3290605.3300779]
                 [39]  Castelluccia C, Dürmuth M, Perito D. Adaptive password-strength meters from Markov models. In: Proc. of the 19th Annual Network
                      and Distributed System Security Symp. San Diego: The Internet Society, 2012.
                 [40]  Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF, Lopez J. Guess again (and again and again):
                      Measuring password strength by simulating password-cracking algorithms. In: Proc. of the 2012 IEEE Symp. on Security and Privacy.
                      San Francisco: IEEE, 2012. 523–537. [doi: 10.1109/SP.2012.38]
                 [41]  Dhamija R, Perrig A. Déjà VU—A user study using images for authentication. In: Proc. of the 9th USENIX Security Symp. Denver:
                      USENIX Association, 2000. 4–4.
                 [42]  Davis D, Monrose F, Reiter MK. On user choice in graphical password schemes. In: Proc. of the 13th USENIX Security Symp. San
                      Diego: USENIX, 2004. 151–164.
                 [43]  De Angeli A, Coutts M, Coventry L, Johnson GI, Cameron D, Fischer MH. VIP: A visual approach to user authentication. In: Proc. of
                      the 2002 Working Conf. on Advanced Visual Interfaces. Trento: ACM, 2002. 316–323. [doi: 10.1145/1556262.1556312]
                 [44]  Sun HP, Wang K, Li X, Qin N, Chen Z. PassApp: My APP is my password! In: Proc. of the 17th Int’l Conf. on Human-computer
                      Interaction with Mobile Devices and Services. Copenhagen: ACM, 2015. 306–315. [doi: 10.1145/2785830.2785880]
                 [45]  Jermyn I, Mayer A, Monrose F, Reiter MK, Rubin AD. The design and analysis of graphical passwords. In: Proc. of the 8th Conf. on
                      USENIX Security Symp. Washington: USENIX Association, 1999. 1. [doi: 10.5555/1251421.1251422]
                 [46]  Sherman  M,  Clark  G,  Yang  YL,  Sugrim  S,  Modig  A,  Lindqvist  J,  Oulasvirta  A,  Roos  T.  User-generated  free-form  gestures  for
                      authentication: Security and memorability. In: Proc. of the 12th Annual Int’l Conf. on Mobile Systems, Applications, and Services.
                      Bretton Woods: ACM, 2014. 176–189. [doi: 10.1145/2594368.2594375]
                 [47]  Sae-Bae N, Memon N. Online signature verification on mobile devices. IEEE Trans. on Information Forensics and Security, 2014, 9(6):
                      933–947. [doi: 10.1109/TIFS.2014.2316472]
                 [48]  Cho G, Huh JH, Cho J, Oh S, Song Y, Kim H. SysPal: System-guided pattern locks for Android. In: Proc. of the 2017 IEEE Symp. on
                      Security and Privacy. San Jose: IEEE, 2017. 338–356. [doi: 10.1109/SP.2017.61]
                 [49]  Yao  MY,  Tao  D.  Implicit  authentication  mechanism  of  pattern  unlock  based  on  over-sampling  and  one-class  classification  for
                      smartphones. Computer Science, 2020, 47(11): 19–24 (in Chinese with English abstract). [doi: 10.11896/jsjkx.200600004]
                 [50]  Forman T, Aviv A. Double patterns: A usable solution to increase the security of Android unlock patterns. In: Proc. of the 36th Annual
                      Computer Security Applications Conf. Austin: ACM, 2020. 219–233. [doi: 10.1145/3427228.3427252]
                 [51]  Munyendo  CW,  Grant  M,  Markert  P,  Forman  TJ,  Aviv  AJ.  Using  a  blocklist  to  improve  the  security  of  user  selection  of  Android
                      patterns. In: Proc. of the 17th USENIX Conf. on Usable Privacy and Security. 2021. 3. [doi: 10.5555/3563572.3563575]
                 [52]  Dirik AE, Memon N, Birget JC. Modeling user choice in the PassPoints graphical password scheme. In: Proc. of the 3rd Symp. on
                      Usable Privacy and Security. Pittsburgh: ACM, 2007. 20–28. [doi: 10.1145/1280680.1280684]
                 [53]  Raghavendra R, Busch C, Yang B. Scaling-robust fingerprint verification with smartphone camera in real-life scenarios. In: Proc. of the
                      6th  IEEE  Int’l  Conf.  on  Biometrics:  Theory,  Applications  and  Systems.  Arlington:  IEEE,  2013.  1–8.  [doi:  10.1109/BTAS.2013.
                      6712736]
                 [54]  Komeili M, Armanfard N, Hatzinakos D. Liveness detection and automatic template updating using fusion of ECG and fingerprint.
                      IEEE Trans. on Information Forensics and Security, 2018, 13(7): 1810–1822. [doi: 10.1109/TIFS.2018.2804890]
                 [55]  Park  E,  Cui  XN,  Nguyen  THB,  Kim  H.  Presentation  attack  detection  using  a  tiny  fully  convolutional  network.  IEEE  Trans.  on
                      Information Forensics and Security, 2019, 14(11): 3016–3025. [doi: 10.1109/TIFS.2019.2907184]
                 [56]  Wu C, He K, Chen J, Zhao ZM, Du RY. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to
                      defeat puppet attacks. In: Proc. of the 29th USENIX Security Symp. USENIX Association, 2020. 2219–2236.
                 [57]  Taigman Y, Yang M, Ranzato MA, Wolf L. DeepFace: Closing the gap to human-level performance in face verification. In: Proc. of the
   344   345   346   347   348   349   350   351   352   353   354