CFP last date
22 April 2024
Reseach Article

Brute Force Attack on Mobile Keypad

by Vishal Singh, Namita Tiwari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 171 - Number 6
Year of Publication: 2017
Authors: Vishal Singh, Namita Tiwari
10.5120/ijca2017915083

Vishal Singh, Namita Tiwari . Brute Force Attack on Mobile Keypad. International Journal of Computer Applications. 171, 6 ( Aug 2017), 40-42. DOI=10.5120/ijca2017915083

@article{ 10.5120/ijca2017915083,
author = { Vishal Singh, Namita Tiwari },
title = { Brute Force Attack on Mobile Keypad },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 171 },
number = { 6 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 40-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume171/number6/28189-2017915083/ },
doi = { 10.5120/ijca2017915083 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:46.229012+05:30
%A Vishal Singh
%A Namita Tiwari
%T Brute Force Attack on Mobile Keypad
%J International Journal of Computer Applications
%@ 0975-8887
%V 171
%N 6
%P 40-42
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, mobile is a very useful and important device for everyone because of it’s functionality. By the end of 2016 smartphone users are more than 2 billions according to the times of new York. Smartphone contain sensitive data so if they loss or hacked a big problem may arise directly or indirectly so mobile devices should be secure from different-different type of attacks. So security is a big issue. Basically there are 2 major attacks happens on mobile keypad locks. First one is brute force attack and the second one is smudge attack. Smudge attack also known as passive attack because in smudge attack attacker first have to collect and analyse the data.

References
  1. [Young Sam Ryu,2010]”Usability Evaluation of Randomized Keypad” Department of Computer Science,Texas State University-San Marcos, Vol. 5, Issue 2, February 2010, pp. 65-75
  2. [I. Kim,2010]” Keypad against brute force attacks on smartphones”, IEEE transactions on security, 2010.
  3. [Adam J. Aviv et al,2010], Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith,”Smudge Attacks on Smartphone Touch Screens”,2010.
  4. [Yanyan Li et al,2014], Junshuang Yang, Mengjun Xie, Dylan Carlsony, Han Gil Jangz, Jiang Bian,” Comparison of PIN- and Pattern-based Behavioral Biometric Authentication on Mobile Devices”,IEEE transaction paper,2014.
  5. [K. K. Brajesh,2012],An Approach For User Authentication One Time Password (Numeric And Graphical) Scheme, Journal of Global Research in Computer Science, 3, 54-57.
  6. [Ihor Vasyltsov,2016], Senior Member, IEEE, Changgyu Bak,” Method for Seamless Unlock Function for Mobile Applications”,2016.
  7. [K. I. Shin et al,2012],“Design and Implementation of Improved Authentication System for Android Smartphone Users,” in Proc. 26th Int. Conf. Advanced Information Networking and Applications Workshops (WAINA 12), 2012, pp. 704–707.
  8. [Hirsch, S.B. ,1982],Secure keyboard input terminal, United States Patent #4,333,090: United States Patent and Trademark Office, 305 Peck Dr., Beverly Hills, CA 90212.
  9. [Marian Harbach1 et al,2010],Alexander De Luca2, Serge Egelman1;3 1International Computer Science Institute, Berkeley, CA” The Anatomy of Smartphone Unlocking A Field Study of Android Lock Screens”, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Brute force attack(BFA) Smudge attack(SA) Completion rate(CR) error rate(ER) average(avg).