To avoid shoulder surfing
attack, all nine images were shown to user in random order and a random code was assigned to each image during the login.
In a world in which other people's screens are virtually impossible to ignore, there were "no detailed investigations of shoulder surfing
incidents and their real-world implications," wrote the researchers in Munich.
Since this scheme can be run while the screen is off, the shoulder surfing
attack is more difficult than the Android pattern lock.
There are two types of shoulder surfing
attacks: single-attacker-based shoulder surfing
with naked eyes and multiple-attacker-based shoulder surfing
with naked eyes.
Beznosov and Beznosova (2007) defined human issues as those related to or concerned with a person, such as phishing or shoulder surfing
. We expand that definition, defining human issues as those where a person is explicitly involved in accomplishing the outcome.
It always is important to know who is around to avoid shoulder surfing
or any other suspicious activities.
Thus we design and developed a Pattern based mutual Near Field Proximity Authentication (NFPA) for safe and secure data dissemination eliminating MITM and Shoulder Surfing
Attacks in insecure public networks between peer devices using QR Code Technology.
I add antishoulder, unlisted but with many Net quotes for the hyphenated spelling, mostly related to countering 'shoulder surfing
', plus one unhyphenated use, antishoulder policy, meaning no bicycles allowed on road shoulders.
MEMBERS of the public are warned to be vigilant after two offences of "shoulder surfing
" were recorded in Middlesbrough.
So they will either watch you at an ATM, known as shoulder surfing
, or use a hidden camera to capture your code.
Freidinger, "A PIN-entry method resilient against shoulder surfing
," in Proc.
* Shoulder Surfing
Prevention: This is the measure for how the user can avoid losing the credentials caused by shoulder surfing