• Title/Summary/Keyword: Pattern screen lock

Search Result 6, Processing Time 0.016 seconds

Layered Pattern Authentication Scheme on Smartphone Resistant to Social Engineering Attacks (사회공학적 공격에 강인한 스마트폰 계층화 패턴 인증 기법)

  • Tak, Dongkil;Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.280-290
    • /
    • 2016
  • In this paper, we propose a layered pattern authentication scheme resistant to social engineering attacks. Existing android pattern lock scheme has some weak points for social engineering attacks. Thus, the proposed scheme improves the existing pattern lock scheme. In our scheme, pattern is recorded by touch screen, however, it is different with existing schemes because of the layered pattern. During the pattern registration process, users register their own pattern with many layers. Thus, registered pattern is 3D shape. When the smudge attack is occurring, the attacker can see the shape of user pattern through the smudge on smartphone screen. However, it is described on 2D surface, so acquired pattern is not fully determine to users original 3D shape. Therefore, our scheme is resistant to social engineering attack, especially smudge attack.

A proposal of Circular Lock Pattern Method on Smart phone (원형 스마트폰 잠금 패턴 방식 제안)

  • Im, Ji-woo;Lee, Seung-jay;Jang, Won-jun;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1471-1477
    • /
    • 2019
  • Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users' smart phones don't support biometric security. The most convenient security method for devices that don't support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It's expected to solve vulnerability.

Side-Channel Attack of Android Pattern Screen Lock Exploiting Cache-Coherent Interface in ARM Processors (ARM 캐시 일관성 인터페이스를 이용한 안드로이드 OS의 스크린 잠금 기능 부채널 공격)

  • Kim, Youngpil;Lee, Kyungwoon;Yoo, Seehwan;Yoo, Chuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.227-242
    • /
    • 2022
  • This paper presents a Cache-Coherency Interconnect(CCI)-based Android pattern screen lock(PSL) attack on modern ARM processors. CCI has been introduced to maintain the cache coherency between the big core cluster and the little core cluster. That is, CCI is the central interconnect inside SoC that maintains cache coherency and shares data. In this paper, we reveal that CCI can be a side channel in security, that an adversary can observe security-sensitive operations. We design and implement a technique to compromise Android PSL within only a few attempts using the information of CCI in user-level applications on Android Nougat. Further, we analyzed the relationship between the pattern complexity and security. Our evaluation results show that complex and simple patterns would have similar security strengths against the proposed technique.

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.

A Study on the Material of Furniture in Goryeo (고려시대 가구재료 연구)

  • Cho, Sook-Kyung
    • Journal of the Korea Furniture Society
    • /
    • v.25 no.1
    • /
    • pp.19-27
    • /
    • 2014
  • This paper studied the materials of the furniture which the noble men used in Goryeo, based on the furniture material category of solid wood furniture, lacquerware inlaid with mother-of-pearl and hardware. As for the solid wood furniture, the wood and furniture types are inferred based on the documents. The trees used for the wood furniture were zelkova, korean willow, pine, royal paulownia, maidenhair tree, korean pine, chinese juniper and elm. The furniture types were table, chair, wooden bench, small portable table, writing table, and folding screen. As to the types of lacquerware inlaid with mother-of-pearl, most of them were hams with top, which were made of abalone shells. The features of the lacquerware inlaid with mother-of-pearl were in detail and elaborate like the pattern of the full bloomed chrysanthemum. Writing tables were also made of lacquerware as pieces of furniture. Distinctively, the mother-of-pearl furniture material was popular enough to be used even in a horse saddle. Regarding the metal feldspar used as both a practical use and decoration, there are drop handle, hinge, the front basis, and lock seen in the artifacts, which were made of cast iron, bronze, and brass. Their manufacture techniques were eojamoon, bratticing and sheet metal. Through this study of the furniture materials used in Goryeo, it seems that Goryeo furniture focused on the functions rather than on the decorations, and in turn the forms were simple and basic. The technique of mother-of-pearl, a bit elaborate one, was used in the props furniture like kitchen wares, hams, or writing talbes. Probably, the solid wood is inferred to be used in a low wooden bench, a chair, and a table based on the documents.

  • PDF

An Input Method for Decimal Password Based on Eyeblink Patterns (눈깜빡임 패턴에 기반한 십진 패스워드 입력 방법)

  • Lee, Seung Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.656-661
    • /
    • 2022
  • Password with a combination of 4-digit numbers has been widely adopted for various authentication systems (such as credit card authentication, digital door lock systems and so on). However, this system could not be safe because the 4-digit password can easily be stolen by predicting it from the fingermarks on the keypad or display screen. Furthermore, due to the prolonged COVID-19 pandemic, contactless method has been preferred over contact method in authentication. This paper suggests a new password input method based on eyeblink pattern analysis in video sequence. In the proposed method, when someone stands in front of a camera, the sequence of eyeblink motions is captured (according to counting signal from 0 to 9 or 9 to 0), analyzed and encoded, producing the desired 4-digit decimal numbers. One does not need to touch something like keypad or perform an exaggerated action, which can become a very important clue for intruders to predict the password.