Open Sesame! Hacking the Password View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2016

AUTHORS

Hwajeong Seo , Zhe Liu , Gyuwon Seo , Taehwan Park , Jongseok Choi , Howon Kim

ABSTRACT

Wearable technology provides user friendly and customized services with multiple sensor data. However, user’s sensor data is very personal and sensitive information. If malicious user abuses this information, it would cause huge social problems. In this paper, we present a novel hacking method to identify the user’s password from wearable devices. We gathered three axis acceleration information from user’s wearable devices and estimated the user’s activity. After then we conducted post-processing to eliminate the impossible cases. This approach reduces the password complexity by 99.99 %. More... »

PAGES

215-226

Book

TITLE

Information Security Applications

ISBN

978-3-319-31874-5
978-3-319-31875-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18

DOI

http://dx.doi.org/10.1007/978-3-319-31875-2_18

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1034314757


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seo", 
        "givenName": "Hwajeong", 
        "id": "sg:person.015101423711.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Luxembourg", 
          "id": "https://www.grid.ac/institutes/grid.16008.3f", 
          "name": [
            "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Zhe", 
        "id": "sg:person.013144776623.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seo", 
        "givenName": "Gyuwon", 
        "id": "sg:person.015667302743.12", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015667302743.12"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Park", 
        "givenName": "Taehwan", 
        "id": "sg:person.014133561767.73", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Choi", 
        "givenName": "Jongseok", 
        "id": "sg:person.016515567115.78", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kim", 
        "givenName": "Howon", 
        "id": "sg:person.010610076315.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/2516760.2516770", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001276888"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2627393.2627417", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016218363"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2666620.2666622", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016264355"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2185448.2185465", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021086094"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2046707.2046771", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033096081"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2420950.2420957", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041150923"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2162081.2162095", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041377256"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1049/iet-ifs.2010.0212", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1056828542"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2016", 
    "datePublishedReg": "2016-01-01", 
    "description": "Wearable technology provides user friendly and customized services with multiple sensor data. However, user\u2019s sensor data is very personal and sensitive information. If malicious user abuses this information, it would cause huge social problems. In this paper, we present a novel hacking method to identify the user\u2019s password from wearable devices. We gathered three axis acceleration information from user\u2019s wearable devices and estimated the user\u2019s activity. After then we conducted post-processing to eliminate the impossible cases. This approach reduces the password complexity by 99.99\u00a0%.", 
    "editor": [
      {
        "familyName": "Kim", 
        "givenName": "Ho-won", 
        "type": "Person"
      }, 
      {
        "familyName": "Choi", 
        "givenName": "Dooho", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-31875-2_18", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-31874-5", 
        "978-3-319-31875-2"
      ], 
      "name": "Information Security Applications", 
      "type": "Book"
    }, 
    "name": "Open Sesame! Hacking the Password", 
    "pagination": "215-226", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-31875-2_18"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "a376130cb99793787f2e6ff6b5d207c2e49f1787ccfd6aa46a71603533cb069a"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1034314757"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-31875-2_18", 
      "https://app.dimensions.ai/details/publication/pub.1034314757"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T19:10", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8684_00000264.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-31875-2_18"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18'


 

This table displays all metadata directly associated to this object as RDF triples.

132 TRIPLES      23 PREDICATES      35 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-31875-2_18 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N38a32267187c4c039b7f9a67ba704cee
4 schema:citation https://doi.org/10.1049/iet-ifs.2010.0212
5 https://doi.org/10.1145/2046707.2046771
6 https://doi.org/10.1145/2162081.2162095
7 https://doi.org/10.1145/2185448.2185465
8 https://doi.org/10.1145/2420950.2420957
9 https://doi.org/10.1145/2516760.2516770
10 https://doi.org/10.1145/2627393.2627417
11 https://doi.org/10.1145/2666620.2666622
12 schema:datePublished 2016
13 schema:datePublishedReg 2016-01-01
14 schema:description Wearable technology provides user friendly and customized services with multiple sensor data. However, user’s sensor data is very personal and sensitive information. If malicious user abuses this information, it would cause huge social problems. In this paper, we present a novel hacking method to identify the user’s password from wearable devices. We gathered three axis acceleration information from user’s wearable devices and estimated the user’s activity. After then we conducted post-processing to eliminate the impossible cases. This approach reduces the password complexity by 99.99 %.
15 schema:editor N59e4f2f9b55c4bfd9a32edf1b7e61d89
16 schema:genre chapter
17 schema:inLanguage en
18 schema:isAccessibleForFree false
19 schema:isPartOf Nf3f6001645b34b82b9084c1a505ba0fd
20 schema:name Open Sesame! Hacking the Password
21 schema:pagination 215-226
22 schema:productId N3455cbf46d6e4226841d573b410159f8
23 N401d96211e77488b9f1d3c426db2f37a
24 N84ec996e1fb542659938811ec00fb2a3
25 schema:publisher Nd028e4b152ed429585d9b152d294c4c7
26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034314757
27 https://doi.org/10.1007/978-3-319-31875-2_18
28 schema:sdDatePublished 2019-04-15T19:10
29 schema:sdLicense https://scigraph.springernature.com/explorer/license/
30 schema:sdPublisher Ne8833693231d4e2989593eeefb0160af
31 schema:url http://link.springer.com/10.1007/978-3-319-31875-2_18
32 sgo:license sg:explorer/license/
33 sgo:sdDataset chapters
34 rdf:type schema:Chapter
35 N0631f891f01b46318c970d25423f7d04 schema:familyName Choi
36 schema:givenName Dooho
37 rdf:type schema:Person
38 N3455cbf46d6e4226841d573b410159f8 schema:name dimensions_id
39 schema:value pub.1034314757
40 rdf:type schema:PropertyValue
41 N38a32267187c4c039b7f9a67ba704cee rdf:first sg:person.015101423711.26
42 rdf:rest N97e03ee7f73f45f28e60574adfc693b2
43 N3cc885313f6b4d60bc951e402b19c9b6 schema:familyName Kim
44 schema:givenName Ho-won
45 rdf:type schema:Person
46 N401d96211e77488b9f1d3c426db2f37a schema:name doi
47 schema:value 10.1007/978-3-319-31875-2_18
48 rdf:type schema:PropertyValue
49 N59e4f2f9b55c4bfd9a32edf1b7e61d89 rdf:first N3cc885313f6b4d60bc951e402b19c9b6
50 rdf:rest Nadfe1b0d3c11479a81c9e032f208172e
51 N78949ac75b234a6cae0f13cd1bf317c8 rdf:first sg:person.016515567115.78
52 rdf:rest Ne0fca7a5d2ed440f86088038e4a84be3
53 N84ec996e1fb542659938811ec00fb2a3 schema:name readcube_id
54 schema:value a376130cb99793787f2e6ff6b5d207c2e49f1787ccfd6aa46a71603533cb069a
55 rdf:type schema:PropertyValue
56 N97e03ee7f73f45f28e60574adfc693b2 rdf:first sg:person.013144776623.84
57 rdf:rest Nbed999fc1cb548ba8f5923930f7f28a3
58 Nadfe1b0d3c11479a81c9e032f208172e rdf:first N0631f891f01b46318c970d25423f7d04
59 rdf:rest rdf:nil
60 Nbed999fc1cb548ba8f5923930f7f28a3 rdf:first sg:person.015667302743.12
61 rdf:rest Ne3c783dc80b845ce8ea93ae2783f27ad
62 Nd028e4b152ed429585d9b152d294c4c7 schema:location Cham
63 schema:name Springer International Publishing
64 rdf:type schema:Organisation
65 Ne0fca7a5d2ed440f86088038e4a84be3 rdf:first sg:person.010610076315.82
66 rdf:rest rdf:nil
67 Ne3c783dc80b845ce8ea93ae2783f27ad rdf:first sg:person.014133561767.73
68 rdf:rest N78949ac75b234a6cae0f13cd1bf317c8
69 Ne8833693231d4e2989593eeefb0160af schema:name Springer Nature - SN SciGraph project
70 rdf:type schema:Organization
71 Nf3f6001645b34b82b9084c1a505ba0fd schema:isbn 978-3-319-31874-5
72 978-3-319-31875-2
73 schema:name Information Security Applications
74 rdf:type schema:Book
75 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
76 schema:name Information and Computing Sciences
77 rdf:type schema:DefinedTerm
78 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
79 schema:name Information Systems
80 rdf:type schema:DefinedTerm
81 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
82 schema:familyName Kim
83 schema:givenName Howon
84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
85 rdf:type schema:Person
86 sg:person.013144776623.84 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
87 schema:familyName Liu
88 schema:givenName Zhe
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84
90 rdf:type schema:Person
91 sg:person.014133561767.73 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
92 schema:familyName Park
93 schema:givenName Taehwan
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73
95 rdf:type schema:Person
96 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
97 schema:familyName Seo
98 schema:givenName Hwajeong
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
100 rdf:type schema:Person
101 sg:person.015667302743.12 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
102 schema:familyName Seo
103 schema:givenName Gyuwon
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015667302743.12
105 rdf:type schema:Person
106 sg:person.016515567115.78 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
107 schema:familyName Choi
108 schema:givenName Jongseok
109 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78
110 rdf:type schema:Person
111 https://doi.org/10.1049/iet-ifs.2010.0212 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056828542
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1145/2046707.2046771 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033096081
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1145/2162081.2162095 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041377256
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1145/2185448.2185465 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021086094
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1145/2420950.2420957 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041150923
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1145/2516760.2516770 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001276888
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1145/2627393.2627417 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016218363
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1145/2666620.2666622 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016264355
126 rdf:type schema:CreativeWork
127 https://www.grid.ac/institutes/grid.16008.3f schema:alternateName University of Luxembourg
128 schema:name Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg
129 rdf:type schema:Organization
130 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
131 schema:name School of Computer Science and Engineering, Pusan National University
132 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...