Abdelrahman, Y., Khamis, M., Schneegass, S., and Alt, F. Stay cool! understanding thermal attacks on mobile-based user authentication. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2017), CHI’17, ACM, pp. 3751–3763.Google Scholar
Adams, A., Sasse, M. A., and Lunt, P. Making passwords secure and usable. In People and Computers XII. Springer, 1997, pp. 1–19.Google Scholar
Alzubaidi, A., and Kalita, J. Authentication of smartphone users using behavioral biometrics. IEEE Communications Surveys Tutorials 18, 3 (thirdquarter 2016), 1998–2026.Web of ScienceCrossrefGoogle Scholar
Buschek, D., De Luca, A., and Alt, F. Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (New York, NY, USA, 2015), CHI’15, ACM, pp. 1393–1402.Google Scholar
Buschek, D., De Luca, A., and Alt, F. Evaluating the influence of targets and hand postures on touch-based behavioural biometrics. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), CHI’16, ACM, pp. 1349–1361.Google Scholar
Florêncio, D., Herley, C., and Van Oorschot, P. C. Password portfolios and the finite-effort user: Sustainably managing large numbers of accounts. In 23rd USENIX Security Symposium (USENIX Security 14) (2014), pp. 575–590.Google Scholar
George, C., Khamis, M., von Zezschwitz, E., Burger, M., Schmidt, H., Alt, F., and Hussmann, H. Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality. NDSS.
Harbach, M., von Zezschwitz, E., Fichtner, A., Luca, A. D., and Smith, M. It’s a hard lock life: A field study of smartphone (un)locking behavior and risk perception. In 10th Symposium On Usable Privacy and Security (SOUPS 2014) (Menlo Park, CA, July 2014), USENIX Association, pp. 213–230.Google Scholar
Herley, C., Van Oorschot, P. C., and Patrick, A. S. Passwords: If we’re so smart, why are we still using them? In International Conference on Financial Cryptography and Data Security (2009), Springer, pp. 230–237.Google Scholar
Kuyoro, S., Ibikunle, F., and Awodele, O. Cloud computing security issues and challenges. International Journal of Computer Networks (IJCN) 3, 5 (2011), 247–255.Google Scholar
Li, F., Rogers, L., Mathur, A., Malkin, N., and Chetty, M. Keepers of the machines: examining how system administrators manage software updates. In Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security (2019), USENIX Association, pp. 273–288.Google Scholar
Muaaz, M., and Mayrhofer, R. Smartphone-based gait recognition: From authentication to imitation. IEEE Transactions on Mobile Computing 16, 11 (Nov 2017), 3209–3221.Web of ScienceCrossrefGoogle Scholar
Naiakshina, A., Danilova, A., Gerlitz, E., von Zezschwitz, E., and Smith, M. “if you want, i can store the encrypted password”: A password-storage field study with freelance developers. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (2019), ACM.Google Scholar
Prange, S., von Zezschwitz, E., and Alt, F. Vision: Exploring challenges and opportunities for usable authentication in the smart home. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (2019), IEEE, pp. 154–158.Google Scholar
Sasse, M. A., and Flechais, I. Usable security: Why do we need it? how do we get it? O’Reilly, 2005.Google Scholar
Schneegass, S., Oualil, Y., and Bulling, A. Skullconduct: Biometric user identification on eyewear computers using bone conduction through the skull. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), CHI’16, ACM, pp. 1379–1384.Google Scholar
Stobert, E., and Biddle, R. The password life cycle: user behaviour in managing passwords. In 10th Symposium On Usable Privacy and Security (SOUPS 2014) (2014), pp. 243–255.Google Scholar
About the article
Florian Alt is a professor for Usable Security and Privacy at the Resarch Institute CODE of the Bundeswehr University, Munich. Florian looks at the role of humans in security critical systems, focusing on topics related to behavioral biometrics, physiological security, social engineering, and usable security in novel application areas, such as smarthomes and VR. Florian is a subcommittee chair for CHI 2020, program chair of Mensch und Computer 2019 and 2020 and general chair of the 2018 Conference on Mobile and Ubiquitous Multimedia. He holds a PhD in computer science from the University of Stuttgart and a diploma in Media Informatics from LMU Munich.
Emanuel von Zezschwitz
Emanuel von Zezschwitz is leading an independent research group on usable security methods at the University of Bonn. Additionally, he is affiliated with Fraunhofer FKIE. He has a strong interest in privacy and security. His research focuses on the investigation of user behavior and security problems in the wild to develop practical solutions which actually fit into the context of use. He is actively involved in the fields of HCI and usable privacy and security. His work is internationally recognized and he is part of several program committees of highly ranked scientific conferences (e. g., CHI, SOUPS). In 2019, Emanuel von Zezschwitz will join Google as UX Researcher, based in Munich.
Published Online: 2020-01-14
Published in Print: 2019-11-18