Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Smudge attack
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Smudge_attack
http://dbpedia.org/ontology/abstract A smudge attack is an information extractiA smudge attack is an information extraction attack that discerns the password input of a touchscreen device such as a cell phone or tablet computer from fingerprint smudges. A team of researchers at the University of Pennsylvania were the first to investigate this type of attack in 2010. An attack occurs when an unauthorized user is in possession or is nearby the device of interest. The attacker relies on detecting the oily smudges produced and left behind by the user's fingers to find the pattern or code needed to access the device and its contents. Simple cameras, lights, fingerprint powder, and image processing software can be used to capture the fingerprint deposits created when the user unlocks their device. Under proper lighting and camera settings, the finger smudges can be easily detected, and the heaviest smudges can be used to infer the most frequent input swipes or taps from the user. Smudge attacks are particularly successful when performed on devices that offer personal identification numbers (PINs), text-based passwords, and pattern-based passwords as locking options. There are various proposed countermeasures to mitigate attacks, such as biometrics, TinyLock, and SmudgeSafe, all which are different authentication schemes. Many of these methods provide ways to either cover up the smudges using a stroking method or implement randomized changes so previous logins are different from the current input.gins are different from the current input.
http://dbpedia.org/ontology/thumbnail http://commons.wikimedia.org/wiki/Special:FilePath/IPad_with_extensive_fingerprints_and_smudges.jpg?width=300 +
http://dbpedia.org/ontology/wikiPageID 36197065
http://dbpedia.org/ontology/wikiPageLength 54589
http://dbpedia.org/ontology/wikiPageRevisionID 1121137622
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Face_ID + , http://dbpedia.org/resource/Lock_screen + , http://dbpedia.org/resource/Intermolecular_force + , http://dbpedia.org/resource/Touch_ID + , http://dbpedia.org/resource/Image_processing + , http://dbpedia.org/resource/PC_Pro + , http://dbpedia.org/resource/Engadget + , http://dbpedia.org/resource/Fingerprint_powder + , http://dbpedia.org/resource/Iris_recognition + , http://dbpedia.org/resource/Arch_%28fingerprint%29 + , http://dbpedia.org/resource/Category:Computer_security_exploits + , http://dbpedia.org/resource/Password_strength + , http://dbpedia.org/resource/Personal_identification_number + , http://dbpedia.org/resource/Fingerprint_recognition + , http://dbpedia.org/resource/Mobile_security + , http://dbpedia.org/resource/Electronic_transactions + , http://dbpedia.org/resource/Nokia + , http://dbpedia.org/resource/Zagg + , http://dbpedia.org/resource/Incident_ray + , http://dbpedia.org/resource/Image_matching + , http://dbpedia.org/resource/Facial_recognition_system + , http://dbpedia.org/resource/Whisper_Systems + , http://dbpedia.org/resource/Shoulder_surfing_%28computer_security%29 + , http://dbpedia.org/resource/Microsoft_Lumia + , http://dbpedia.org/resource/Password_cracking + , http://dbpedia.org/resource/Side-channel_attack + , http://dbpedia.org/resource/Tablet_computer + , http://dbpedia.org/resource/Diffuse_reflection + , http://dbpedia.org/resource/Tempered_glass + , http://dbpedia.org/resource/Binary_image + , http://dbpedia.org/resource/USENIX + , http://dbpedia.org/resource/University_of_Pennsylvania + , http://dbpedia.org/resource/File:IPad_with_extensive_fingerprints_and_smudges.jpg + , http://dbpedia.org/resource/Specular_reflection + , http://dbpedia.org/resource/BlackBerry_DTEK50 + , http://dbpedia.org/resource/Gesture_recognition + , http://dbpedia.org/resource/LG_Electronics + , http://dbpedia.org/resource/Machine_learning + , http://dbpedia.org/resource/Password + , http://dbpedia.org/resource/Encryption + , http://dbpedia.org/resource/Biometrics + , http://dbpedia.org/resource/Authentication + , http://dbpedia.org/resource/InvisibleShield + , http://dbpedia.org/resource/Draw_a_Secret + , http://dbpedia.org/resource/Surface_energy + , http://dbpedia.org/resource/Biometric_points + , http://dbpedia.org/resource/HTC_Hero + , http://dbpedia.org/resource/Oleophobic + , http://dbpedia.org/resource/High-resolution + , http://dbpedia.org/resource/Flexible_display + , http://dbpedia.org/resource/Touchscreen + , http://dbpedia.org/resource/Markov_model + , http://dbpedia.org/resource/File:IPad_smudges_after.jpg + , http://dbpedia.org/resource/File:IPad_smudges_before.jpg + , http://dbpedia.org/resource/Secretory_gland + , http://dbpedia.org/resource/Gait_analysis + , http://dbpedia.org/resource/Keystroke_dynamics + , http://dbpedia.org/resource/ZDNet + , http://dbpedia.org/resource/Automated_teller_machine + , http://dbpedia.org/resource/Alphanumeric + , http://dbpedia.org/resource/Tap_code + , http://dbpedia.org/resource/2-dimensional_polytope + , http://dbpedia.org/resource/Brute-force_attack + , http://dbpedia.org/resource/Hand_geometry + , http://dbpedia.org/resource/Signature_scheme + , http://dbpedia.org/resource/National_Science_and_Technology_Council + , http://dbpedia.org/resource/Weak_password + , http://dbpedia.org/resource/Whorl_%28fingerprint%29 + , http://dbpedia.org/resource/Canny_edge_detector + , http://dbpedia.org/resource/Speaker_recognition + , http://dbpedia.org/resource/Minutiae + , http://dbpedia.org/resource/Epidermis + , http://dbpedia.org/resource/Lipophobicity + , http://dbpedia.org/resource/Sierpi%C5%84ski_triangle +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Main + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:Short_description +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Computer_security_exploits +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource/Method +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Smudge_attack?oldid=1121137622&ns=0 +
http://xmlns.com/foaf/0.1/depiction http://commons.wikimedia.org/wiki/Special:FilePath/IPad_with_extensive_fingerprints_and_smudges.jpg + , http://commons.wikimedia.org/wiki/Special:FilePath/IPad_smudges_after.jpg + , http://commons.wikimedia.org/wiki/Special:FilePath/IPad_smudges_before.jpg +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Smudge_attack +
owl:sameAs http://dbpedia.org/resource/Smudge_attack + , http://www.wikidata.org/entity/Q7546585 + , http://rdf.freebase.com/ns/m.0k0qqv8 + , http://yago-knowledge.org/resource/Smudge_attack + , https://global.dbpedia.org/id/4uJWT +
rdf:type http://dbpedia.org/ontology/Software + , http://dbpedia.org/class/yago/Action100037396 + , http://dbpedia.org/class/yago/PsychologicalFeature100023100 + , http://dbpedia.org/class/yago/Abstraction100002137 + , http://dbpedia.org/class/yago/WikicatComputerSecurityExploits + , http://dbpedia.org/class/yago/YagoPermanentlyLocatedEntity + , http://dbpedia.org/class/yago/Act100030358 + , http://dbpedia.org/class/yago/Accomplishment100035189 + , http://dbpedia.org/class/yago/Event100029378 + , http://dbpedia.org/class/yago/Feat100036762 +
rdfs:comment A smudge attack is an information extractiA smudge attack is an information extraction attack that discerns the password input of a touchscreen device such as a cell phone or tablet computer from fingerprint smudges. A team of researchers at the University of Pennsylvania were the first to investigate this type of attack in 2010. An attack occurs when an unauthorized user is in possession or is nearby the device of interest. The attacker relies on detecting the oily smudges produced and left behind by the user's fingers to find the pattern or code needed to access the device and its contents. Simple cameras, lights, fingerprint powder, and image processing software can be used to capture the fingerprint deposits created when the user unlocks their device. Under proper lighting and camera settings, the finger smudges can be easily ettings, the finger smudges can be easily
rdfs:label Smudge attack
hide properties that link here 
http://dbpedia.org/resource/Smudge + http://dbpedia.org/ontology/wikiPageDisambiguates
http://dbpedia.org/resource/Thermal_attack + , http://dbpedia.org/resource/Lipophobicity + , http://dbpedia.org/resource/BlackBerry_DTEK + , http://dbpedia.org/resource/Smudge + , http://dbpedia.org/resource/Password_cracking + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Smudge_attack + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Smudge_attack + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.