USENIX Association 2015 Symposium on Usable Privacy and Security 269
11. REFERENCES
[1] D. Abalenkovs, P. Bondarenko, V. K. Pathapati, A. Nordbø,
D. Piatkivskyi, J. E. Rekdal, and P. B. Ruthven. Mobile
forensics: Comparison of extraction and analyzing methods
of ios and android. Master Thesis, GjÃÿvik University
College, 2012.
[2] A. A. Al-Daraiseh, D. Al Omari, H. Al Hamid, N. Hamad,
and R. Althemali. Effectiveness of iphone’s touch id: Ksa
case study. (IJACSA) International Journal of Advanced
Computer Science and Applications, 6(1):154–161, 2015.
[3] Amitay. Most common iphone passcodes.
http://danielamitay.com/blog/2011/6/13/
most-common-iphone-passcodes, June 2011. last accessed
March 8, 2015.
[4] Apple. iOS Security, 8.1 and up. http:
//www.apple.com/business/docs/iOS_Security_Guide.pdf,
2014. Accessed April 26, 2015.
[5] A. D. Baddeley. Human memory: Theory and practice.
Psychology Press, 1997.
[6] P. Bao, J. Pierce, S. Whittaker, and S. Zhai. Smart phone use
by non-mobile business users. In Proceedings of the 13th
International Conference on Human Computer Interaction
with Mobile Devices and Services, pages 445–454. ACM,
2011.
[7] C. Bhagavatula, B. Ur, K. Iacovino, S. M. Kywe, L. F.
Cranor, and M. Savvides. Biometric authentication on iphone
and android: Usability, perceptions, and influences on
adoption. USEC ’15, February 2015.
[8] J. Bonneau. The science of guessing: analyzing an
anonymized corpus of 70 million passwords. In Security and
Privacy (SP), 2012 IEEE Symposium on, pages 538–552.
IEEE, 2012.
[9] J. Bonneau, C. Herley, P. C. Van Oorschot, and F. Stajano.
The quest to replace passwords: A framework for
comparative evaluation of web authentication schemes. In
Security and Privacy (SP), 2012 IEEE Symposium on, pages
553–567. IEEE, 2012.
[10] F. Breitinger and C. Nickel. User survey on phone security
and usage. In BIOSIG, pages 139–144, 2010.
[11] CNN. iPhone encryption stops FBI, but not this 7-year-old.
http://money.cnn.com/2014/12/01/technology/security/
apple-iphone-encryption-fingerprint, December 2014. last
accessed June 13, 2015.
[12] H. Crawford and K. Renaud. Understanding user perceptions
of transparent authentication on a mobile device. Journal of
Trust Management, 1(1):7, 2014.
[13] A. De Luca, A. Hang, E. von Zezschwitz, and H. Hussmann.
I feel like i’m taking selfies all day! towards understanding
biometric authentication on smartphones. In CHI’15, Seoul,
Korea, 2015.
[14] S. Egelman, S. Jain, R. Portnoff, K. Liao, S. Consolvo, and
D. Wagner. Are you ready to lock? understanding user
motivations for smartphone locking behaviors. In
Proceedings of the 2014 ACM SIGSAC Conference on
Computer & Communications Security, CCS, volume 14,
2014.
[15] Ericsson. Ericsson mobility report. http://www.ericsson.com/
res/docs/2014/ericsson-mobility-report-june-2014.pdf, June
2014. last accessed June 25, 2013.
[16] R. D. Findling and R. Mayrhofer. Towards face unlock: on
the difficulty of reliably detecting faces on mobile phones. In
Proceedings of the 10th International Conference on
Advances in Mobile Computing & Multimedia, pages
275–280. ACM, 2012.
[17] D. Florencio and C. Herley. A large-scale study of web
password habits. In WWW ’07: Proceedings of the 16th
International Conference on World Wide Web, pages
657–666, New York, NY, USA, 2007. ACM.
[18] D. Florêncio and C. Herley. Where do security policies come
from? In Proceedings of the Sixth Symposium on Usable
Privacy and Security, SOUPS ’10, pages 10:1–10:14, New
York, NY, USA, 2010. ACM.
[19] M. Gao, X. Hu, B. Cao, and D. Li. Fingerprint sensors in
mobile devices. In Industrial Electronics and Applications
(ICIEA), 2014 IEEE 9th Conference on, pages 1437–1440.
IEEE, 2014.
[20] Google. Ice cream sandwich. https://developer.android.com/
about/versions/android-4.0-highlights.html, March 2011. last
accessed March 8, 2015.
[21] M. Harbach, E. von Zezschwitz, A. Fichtner, A. D. Luca, and
M. Smith. It’s a hard lock life: A field study of smartphone
(un)locking behavior and risk perception. In Symposium On
Usable Privacy and Security (SOUPS 2014), pages 213–230,
Menlo Park, CA, July 2014. USENIX Association.
[22] C. Herley and P. Van Oorschot. A research agenda
acknowledging the persistence of passwords. Security &
Privacy, IEEE, 10(1):28–36, 2012.
[23] Amazon Mechanical Turk. https://www.mturk.com/, 2005.
[24] M. Jakobsson and R. Akavipat. Rethinking passwords to
adapt to constrained keyboards. Proc. IEEE MoST, 2012.
[25] M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit
authentication for mobile devices. In Proceedings of the 4th
USENIX conference on Hot topics in security, HotSec’09,
Berkeley, CA, USA, 2009. USENIX Association.
[26] S. Karthikeyan, S. Feng, A. Rao, and N. Sadeh. Smartphone
fingerprint authentication versus pins: A usability study
(cmu-cylab-14-012). CMU-CyLab, pages 14–012, July 31
2014.
[27] S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek,
L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of
passwords and people: measuring the effect of
password-composition policies. In Proceedings of the 2011
annual conference on Human factors in computing systems,
CHI ’11, pages 2595–2604, New York, NY, USA, 2011.
ACM.
[28] S. Lee and S. Zhai. The performance of touch screen soft
buttons. In Proceedings of the SIGCHI Conference on
Human Factors in Computing Systems, pages 309–318.
ACM, 2009.
[29] I. Lookout. Lost and found: The challenges of finding your
lost or stolen phone. http://blog.mylookout.com/2011/07/
lost-and-found-the-challenges-of-finding-your-lost-or-stolen-phone/.
last accessed August 18, 2011.
[30] V. Matyáš and Z.
ˇ
Ríha. Biometric authentication—security
and usability. In Advanced Communications and Multimedia
Security, pages 227–239. Springer, 2002.
[31] I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and
K. Beznosov. Understanding users’ requirements for data
protection in smartphones. In Workshop on Secure Data
Management on Smartphones and Mobiles, 2012.
[32] I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and
K. Beznosov. Know your enemy: the risk of unauthorized
access in smartphones by insiders. In Proceedings of the 15th