scholarly journals Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information

2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Peng Foong Ho ◽  
Yvonne Hwei-Syn Kam ◽  
Mee Chin Wee ◽  
Yu Nam Chong ◽  
Lip Yee Por

Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user’s actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set’s input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user’s actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack.

Symmetry ◽  
2019 ◽  
Vol 11 (9) ◽  
pp. 1087 ◽  
Author(s):  
Lip Yee Por ◽  
Chin Soon Ku ◽  
Tan Fong Ang

In this paper, we focus on methods to prevent shoulder-surfing attacks. We initially adopted digraph substitution rules from PlayFair cipher as our proposed method. PlayFair cipher is a modern cryptography method, which exists at the intersection of the disciplines of mathematics and computer science. However, according to our preliminary study it was insufficient to prevent shoulder-surfing attacks. Thus, a new method had to be proposed. In this new proposed method, we improvised the digraph substitution rules and used these rules together with an output feedback method to determine a pass-image. Our proposed method was evaluated with a user study. The results showed our proposed method was robust against both direct observation and video-recorded shoulder-surfing attacks.


2021 ◽  
Author(s):  
Marius Fechter ◽  
Benjamin Schleich ◽  
Sandro Wartzack

AbstractVirtual and augmented reality allows the utilization of natural user interfaces, such as realistic finger interaction, even for purposes that were previously dominated by the WIMP paradigm. This new form of interaction is particularly suitable for applications involving manipulation tasks in 3D space, such as CAD assembly modeling. The objective of this paper is to evaluate the suitability of natural interaction for CAD assembly modeling in virtual reality. An advantage of the natural interaction compared to the conventional operation by computer mouse would indicate development potential for user interfaces of current CAD applications. Our approach bases on two main elements. Firstly, a novel natural user interface for realistic finger interaction enables the user to interact with virtual objects similar to physical ones. Secondly, an algorithm automatically detects constraints between CAD components based solely on their geometry and spatial location. In order to prove the usability of the natural CAD assembly modeling approach in comparison with the assembly procedure in current WIMP operated CAD software, we present a comparative user study. Results show that the VR method including natural finger interaction significantly outperforms the desktop-based CAD application in terms of efficiency and ease of use.


2011 ◽  
Vol 383-390 ◽  
pp. 1500-1506
Author(s):  
Yu Min Pan ◽  
Xiao Yu Zhang ◽  
Peng Qian Xue

A new method of rolling prediction for gas emission based on wavelet neural network is proposed in this paper. In the method, part of the sample data is selected, which length is constant, and the data is reselected as the next prediction step. Then a wavelet neutral network is adopted to prediction which input data is rolling, the sequence model of rolling prediction is thus constructed. Simulation results have proved that the method is valid and feasible.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


2013 ◽  
Vol 331 ◽  
pp. 118-123
Author(s):  
Tian Hui Ding ◽  
Yun Hua Chen ◽  
Lei Tian

As to directing motor design, it is very important to make sure that the motor’s forecast of vibration performance has reference value. So, it must need motor’s parts vibration characteristics simulation results are so close to their characteristics. This paper puts forward a new simulation method of motor pole core vibration characteristics, this method includes setting anisotropy material attributes multipartite, getting attributes parameters values which are based on recommended fitting curves, modeling and equating windings, equating dipping lacquer and so on. Combining with experiments, the new method is validated its availability.


Author(s):  
V. I. Khirkhasova ◽  

The paper deals with modification of cement composite and concrete with nanocellulose in low and high density. The author presents the study results of the influence of nanocellulose on the cement composite hardening process, as well as the physical and mechanical properties of heavy concrete. The influence of the used additive on the rheological and strength characteristics of concrete is revealed. A new method is proposed to improve the material performance.


2021 ◽  
Author(s):  
Jianliang Sun ◽  
Mingze Yan ◽  
Mingyuan Li ◽  
Tongtong Hao

Abstract The flatness target curve is important in the flatness control theory. The accuracy of flatness target curve is an important factor to determine the load of flatness control means and flatness quality. Aiming at the defect that crown of each pass after rolling cannot be controlled quantitatively in the traditional target curve formulation of cold rolling, a new method considering the target crown was proposed. Specifically, the target crown of each pass can be set by combining the total proportional crown change in hot rolling field to each pass and the instability discrimination model in cold rolling field. the total proportional crown change of incoming material and finished product is allocated to each pass, and the instability discrimination model is applied to ensure the stability of the plate. The purpose of new method is to control of the crown of each pass quantitatively, so that the flatness and thickness of plate can meet the production requirements. Taking SUNDWIG 20-high mill and typical rolling products as an example, the simulation results show that, on the basis of ensuring the flatness and obtaining the minimum available crown after rolling, the model can make the flatness and crown meet the production requirements at the same time and control the crown of each pass after rolling quantitatively by setting the target crown of each pass.


2013 ◽  
Vol 5 (2) ◽  
pp. 1-20 ◽  
Author(s):  
Matthias Baldauf ◽  
Peter Fröhlich ◽  
Jasmin Buchta ◽  
Theresa Stürmer

Today’s smartphones provide the technical means to serve as interfaces for public displays in various ways. Even though recent research has identified several new approaches for mobile-display interaction, inter-technique comparisons of respective methods are scarce. The authors conducted an experimental user study on four currently relevant mobile-display interaction techniques (‘Touchpad’, ‘Pointer’, ‘Mini Video’, and ‘Smart Lens’) and learned that their suitability strongly depends on the task and use case at hand. The study results indicate that mobile-display interactions based on a traditional touchpad metaphor are time-consuming but highly accurate in standard target acquisition tasks. The direct interaction techniques Mini Video and Smart Lens had comparably good completion times, and especially Mini Video appeared to be best suited for complex visual manipulation tasks like drawing. Smartphone-based pointing turned out to be generally inferior to the other alternatives. Examples for the application of these differentiated results to real-world use cases are provided.


Sign in / Sign up

Export Citation Format

Share Document