Cracking Android pattern lock in five attempts
- Submitting institution
-
The University of Lancaster
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 154338335
- Type
- E - Conference contribution
- DOI
-
10.14722/ndss.2017.23130
- Title of conference / published proceedings
- Proceedings 2017 Network and Distributed System Security Symposium 2017 (NDSS'17)
- First page
- 0
- Volume
- -
- Issue
- -
- ISSN
- -
- Open access status
- -
- Month of publication
- February
- Year of publication
- 2017
- URL
-
https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/cracking-android-pattern-lock-five-attempts/
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
6
- Research group(s)
-
D - Distributed Systems
- Citation count
- -
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- First work to show how the widely used Android pattern lock can be attacked using computer vision algorithms and thus identifies a significant vulnerability of pattern lock and graphical authentications of this kind. Featured in 200+ media outlets worldwide, including The Times, Daily Mail and Forbes. Results were first shown at NDSS 2017 (16% acceptance rate), a Core A* conference and a top-4 security conference on Google Scholar Top Publications Ranking. Results were later expanded in ACM TOPS (known as TISSEC pre-2018, CORE A security journal). UK National Cyber Security Centre has approached us for using it for law enforcement.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -