Page 349 - 《软件学报》2025年第5期
P. 349
周满 等: 基于声感知的移动终端身份认证综述 2249
[35] Yan Q, Han J, Li YJ, Zhou JY, Deng RH. Designing leakage-resilient password entry on touchscreen mobile devices. In: Proc. of the 8th
ACM SIGSAC Symp. on Information, Computer and Communications Security. Hangzhou: ACM, 2013. 37–48. [doi: 10.1145/2484313.
2484318]
[36] Li ZJ, Li M, Mohapatra P, Han JS, Chen SY. iType: Using eye gaze to enhance typing privacy. In: Proc. of the 2017 IEEE Conf. on
Computer Communications. Atlanta: IEEE, 2017. 1–9. [doi: 10.1109/INFOCOM.2017.8057233]
[37] Alsuhibany SA. A camouflage text-based password approach for mobile devices against shoulder-surfing attack. Security and
Communication Networks, 2021, 2021: 6653076. [doi: 10.1155/2021/6653076]
[38] Mayer P, Gerber N, Reinheimer B, Rack P, Braun K, Volkamer M. I (don’t) see what you typed there! Shoulder-surfing resistant
password entry on gamepads. In: Proc. of the 2019 CHI Conf. on Human Factors in Computing Systems. Glasgow: ACM, 2019. 549.
[doi: 10.1145/3290605.3300779]
[39] Castelluccia C, Dürmuth M, Perito D. Adaptive password-strength meters from Markov models. In: Proc. of the 19th Annual Network
and Distributed System Security Symp. San Diego: The Internet Society, 2012.
[40] Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF, Lopez J. Guess again (and again and again):
Measuring password strength by simulating password-cracking algorithms. In: Proc. of the 2012 IEEE Symp. on Security and Privacy.
San Francisco: IEEE, 2012. 523–537. [doi: 10.1109/SP.2012.38]
[41] Dhamija R, Perrig A. Déjà VU—A user study using images for authentication. In: Proc. of the 9th USENIX Security Symp. Denver:
USENIX Association, 2000. 4–4.
[42] Davis D, Monrose F, Reiter MK. On user choice in graphical password schemes. In: Proc. of the 13th USENIX Security Symp. San
Diego: USENIX, 2004. 151–164.
[43] De Angeli A, Coutts M, Coventry L, Johnson GI, Cameron D, Fischer MH. VIP: A visual approach to user authentication. In: Proc. of
the 2002 Working Conf. on Advanced Visual Interfaces. Trento: ACM, 2002. 316–323. [doi: 10.1145/1556262.1556312]
[44] Sun HP, Wang K, Li X, Qin N, Chen Z. PassApp: My APP is my password! In: Proc. of the 17th Int’l Conf. on Human-computer
Interaction with Mobile Devices and Services. Copenhagen: ACM, 2015. 306–315. [doi: 10.1145/2785830.2785880]
[45] Jermyn I, Mayer A, Monrose F, Reiter MK, Rubin AD. The design and analysis of graphical passwords. In: Proc. of the 8th Conf. on
USENIX Security Symp. Washington: USENIX Association, 1999. 1. [doi: 10.5555/1251421.1251422]
[46] Sherman M, Clark G, Yang YL, Sugrim S, Modig A, Lindqvist J, Oulasvirta A, Roos T. User-generated free-form gestures for
authentication: Security and memorability. In: Proc. of the 12th Annual Int’l Conf. on Mobile Systems, Applications, and Services.
Bretton Woods: ACM, 2014. 176–189. [doi: 10.1145/2594368.2594375]
[47] Sae-Bae N, Memon N. Online signature verification on mobile devices. IEEE Trans. on Information Forensics and Security, 2014, 9(6):
933–947. [doi: 10.1109/TIFS.2014.2316472]
[48] Cho G, Huh JH, Cho J, Oh S, Song Y, Kim H. SysPal: System-guided pattern locks for Android. In: Proc. of the 2017 IEEE Symp. on
Security and Privacy. San Jose: IEEE, 2017. 338–356. [doi: 10.1109/SP.2017.61]
[49] Yao MY, Tao D. Implicit authentication mechanism of pattern unlock based on over-sampling and one-class classification for
smartphones. Computer Science, 2020, 47(11): 19–24 (in Chinese with English abstract). [doi: 10.11896/jsjkx.200600004]
[50] Forman T, Aviv A. Double patterns: A usable solution to increase the security of Android unlock patterns. In: Proc. of the 36th Annual
Computer Security Applications Conf. Austin: ACM, 2020. 219–233. [doi: 10.1145/3427228.3427252]
[51] Munyendo CW, Grant M, Markert P, Forman TJ, Aviv AJ. Using a blocklist to improve the security of user selection of Android
patterns. In: Proc. of the 17th USENIX Conf. on Usable Privacy and Security. 2021. 3. [doi: 10.5555/3563572.3563575]
[52] Dirik AE, Memon N, Birget JC. Modeling user choice in the PassPoints graphical password scheme. In: Proc. of the 3rd Symp. on
Usable Privacy and Security. Pittsburgh: ACM, 2007. 20–28. [doi: 10.1145/1280680.1280684]
[53] Raghavendra R, Busch C, Yang B. Scaling-robust fingerprint verification with smartphone camera in real-life scenarios. In: Proc. of the
6th IEEE Int’l Conf. on Biometrics: Theory, Applications and Systems. Arlington: IEEE, 2013. 1–8. [doi: 10.1109/BTAS.2013.
6712736]
[54] Komeili M, Armanfard N, Hatzinakos D. Liveness detection and automatic template updating using fusion of ECG and fingerprint.
IEEE Trans. on Information Forensics and Security, 2018, 13(7): 1810–1822. [doi: 10.1109/TIFS.2018.2804890]
[55] Park E, Cui XN, Nguyen THB, Kim H. Presentation attack detection using a tiny fully convolutional network. IEEE Trans. on
Information Forensics and Security, 2019, 14(11): 3016–3025. [doi: 10.1109/TIFS.2019.2907184]
[56] Wu C, He K, Chen J, Zhao ZM, Du RY. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to
defeat puppet attacks. In: Proc. of the 29th USENIX Security Symp. USENIX Association, 2020. 2219–2236.
[57] Taigman Y, Yang M, Ranzato MA, Wolf L. DeepFace: Closing the gap to human-level performance in face verification. In: Proc. of the