Open Sesame! Hacking the Password View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2016

AUTHORS

Hwajeong Seo , Zhe Liu , Gyuwon Seo , Taehwan Park , Jongseok Choi , Howon Kim

ABSTRACT

Wearable technology provides user friendly and customized services with multiple sensor data. However, user’s sensor data is very personal and sensitive information. If malicious user abuses this information, it would cause huge social problems. In this paper, we present a novel hacking method to identify the user’s password from wearable devices. We gathered three axis acceleration information from user’s wearable devices and estimated the user’s activity. After then we conducted post-processing to eliminate the impossible cases. This approach reduces the password complexity by 99.99 %. More... »

PAGES

215-226

Book

TITLE

Information Security Applications

ISBN

978-3-319-31874-5
978-3-319-31875-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18

DOI

http://dx.doi.org/10.1007/978-3-319-31875-2_18

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1034314757


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seo", 
        "givenName": "Hwajeong", 
        "id": "sg:person.015101423711.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Luxembourg", 
          "id": "https://www.grid.ac/institutes/grid.16008.3f", 
          "name": [
            "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Zhe", 
        "id": "sg:person.013144776623.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seo", 
        "givenName": "Gyuwon", 
        "id": "sg:person.015667302743.12", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015667302743.12"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Park", 
        "givenName": "Taehwan", 
        "id": "sg:person.014133561767.73", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Choi", 
        "givenName": "Jongseok", 
        "id": "sg:person.016515567115.78", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kim", 
        "givenName": "Howon", 
        "id": "sg:person.010610076315.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/2516760.2516770", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001276888"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2627393.2627417", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016218363"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2666620.2666622", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016264355"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2185448.2185465", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021086094"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2046707.2046771", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033096081"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2420950.2420957", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041150923"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2162081.2162095", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041377256"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1049/iet-ifs.2010.0212", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1056828542"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2016", 
    "datePublishedReg": "2016-01-01", 
    "description": "Wearable technology provides user friendly and customized services with multiple sensor data. However, user\u2019s sensor data is very personal and sensitive information. If malicious user abuses this information, it would cause huge social problems. In this paper, we present a novel hacking method to identify the user\u2019s password from wearable devices. We gathered three axis acceleration information from user\u2019s wearable devices and estimated the user\u2019s activity. After then we conducted post-processing to eliminate the impossible cases. This approach reduces the password complexity by 99.99\u00a0%.", 
    "editor": [
      {
        "familyName": "Kim", 
        "givenName": "Ho-won", 
        "type": "Person"
      }, 
      {
        "familyName": "Choi", 
        "givenName": "Dooho", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-31875-2_18", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-31874-5", 
        "978-3-319-31875-2"
      ], 
      "name": "Information Security Applications", 
      "type": "Book"
    }, 
    "name": "Open Sesame! Hacking the Password", 
    "pagination": "215-226", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-31875-2_18"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "a376130cb99793787f2e6ff6b5d207c2e49f1787ccfd6aa46a71603533cb069a"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1034314757"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-31875-2_18", 
      "https://app.dimensions.ai/details/publication/pub.1034314757"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T19:10", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8684_00000264.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-31875-2_18"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_18'


 

This table displays all metadata directly associated to this object as RDF triples.

132 TRIPLES      23 PREDICATES      35 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-31875-2_18 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author Nb1090c4fb3d14b80ab783e698553af35
4 schema:citation https://doi.org/10.1049/iet-ifs.2010.0212
5 https://doi.org/10.1145/2046707.2046771
6 https://doi.org/10.1145/2162081.2162095
7 https://doi.org/10.1145/2185448.2185465
8 https://doi.org/10.1145/2420950.2420957
9 https://doi.org/10.1145/2516760.2516770
10 https://doi.org/10.1145/2627393.2627417
11 https://doi.org/10.1145/2666620.2666622
12 schema:datePublished 2016
13 schema:datePublishedReg 2016-01-01
14 schema:description Wearable technology provides user friendly and customized services with multiple sensor data. However, user’s sensor data is very personal and sensitive information. If malicious user abuses this information, it would cause huge social problems. In this paper, we present a novel hacking method to identify the user’s password from wearable devices. We gathered three axis acceleration information from user’s wearable devices and estimated the user’s activity. After then we conducted post-processing to eliminate the impossible cases. This approach reduces the password complexity by 99.99 %.
15 schema:editor N652fd63569834da58055eb0a1284d65d
16 schema:genre chapter
17 schema:inLanguage en
18 schema:isAccessibleForFree false
19 schema:isPartOf N36dfed6783824551bec3c00c748cd477
20 schema:name Open Sesame! Hacking the Password
21 schema:pagination 215-226
22 schema:productId N887e083216984fab956d35c4afe79618
23 Na888350401574ba299fe0b1c3815c039
24 Nf62d2f153817430ba711cd234b4ce292
25 schema:publisher Nc33b065671c142a19eea43160c58a42c
26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034314757
27 https://doi.org/10.1007/978-3-319-31875-2_18
28 schema:sdDatePublished 2019-04-15T19:10
29 schema:sdLicense https://scigraph.springernature.com/explorer/license/
30 schema:sdPublisher N6204a2b9864f49e49413cfc841303503
31 schema:url http://link.springer.com/10.1007/978-3-319-31875-2_18
32 sgo:license sg:explorer/license/
33 sgo:sdDataset chapters
34 rdf:type schema:Chapter
35 N278b53c5cb4545ecb59342ff116b0aa1 schema:familyName Choi
36 schema:givenName Dooho
37 rdf:type schema:Person
38 N31e7eb7ede5240bcbca3c00680efef0f rdf:first sg:person.016515567115.78
39 rdf:rest N5f1b8db363cd4f42a05e45feedf657d1
40 N36dfed6783824551bec3c00c748cd477 schema:isbn 978-3-319-31874-5
41 978-3-319-31875-2
42 schema:name Information Security Applications
43 rdf:type schema:Book
44 N4387b9ec0704494bb37b02609062c3dd rdf:first sg:person.013144776623.84
45 rdf:rest Nbc79c76be85b4f2badd1a4574b8a6b02
46 N4abbc00ade8348519ef20b0474586e51 rdf:first sg:person.014133561767.73
47 rdf:rest N31e7eb7ede5240bcbca3c00680efef0f
48 N5f1b8db363cd4f42a05e45feedf657d1 rdf:first sg:person.010610076315.82
49 rdf:rest rdf:nil
50 N6204a2b9864f49e49413cfc841303503 schema:name Springer Nature - SN SciGraph project
51 rdf:type schema:Organization
52 N652fd63569834da58055eb0a1284d65d rdf:first Nc5d6950f527f4ecc8d2a8a6aa5e12aff
53 rdf:rest N67dedbbd1b894d51a109978ca6604044
54 N67dedbbd1b894d51a109978ca6604044 rdf:first N278b53c5cb4545ecb59342ff116b0aa1
55 rdf:rest rdf:nil
56 N887e083216984fab956d35c4afe79618 schema:name readcube_id
57 schema:value a376130cb99793787f2e6ff6b5d207c2e49f1787ccfd6aa46a71603533cb069a
58 rdf:type schema:PropertyValue
59 Na888350401574ba299fe0b1c3815c039 schema:name dimensions_id
60 schema:value pub.1034314757
61 rdf:type schema:PropertyValue
62 Nb1090c4fb3d14b80ab783e698553af35 rdf:first sg:person.015101423711.26
63 rdf:rest N4387b9ec0704494bb37b02609062c3dd
64 Nbc79c76be85b4f2badd1a4574b8a6b02 rdf:first sg:person.015667302743.12
65 rdf:rest N4abbc00ade8348519ef20b0474586e51
66 Nc33b065671c142a19eea43160c58a42c schema:location Cham
67 schema:name Springer International Publishing
68 rdf:type schema:Organisation
69 Nc5d6950f527f4ecc8d2a8a6aa5e12aff schema:familyName Kim
70 schema:givenName Ho-won
71 rdf:type schema:Person
72 Nf62d2f153817430ba711cd234b4ce292 schema:name doi
73 schema:value 10.1007/978-3-319-31875-2_18
74 rdf:type schema:PropertyValue
75 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
76 schema:name Information and Computing Sciences
77 rdf:type schema:DefinedTerm
78 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
79 schema:name Information Systems
80 rdf:type schema:DefinedTerm
81 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
82 schema:familyName Kim
83 schema:givenName Howon
84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
85 rdf:type schema:Person
86 sg:person.013144776623.84 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
87 schema:familyName Liu
88 schema:givenName Zhe
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84
90 rdf:type schema:Person
91 sg:person.014133561767.73 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
92 schema:familyName Park
93 schema:givenName Taehwan
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73
95 rdf:type schema:Person
96 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
97 schema:familyName Seo
98 schema:givenName Hwajeong
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
100 rdf:type schema:Person
101 sg:person.015667302743.12 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
102 schema:familyName Seo
103 schema:givenName Gyuwon
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015667302743.12
105 rdf:type schema:Person
106 sg:person.016515567115.78 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
107 schema:familyName Choi
108 schema:givenName Jongseok
109 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78
110 rdf:type schema:Person
111 https://doi.org/10.1049/iet-ifs.2010.0212 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056828542
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1145/2046707.2046771 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033096081
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1145/2162081.2162095 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041377256
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1145/2185448.2185465 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021086094
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1145/2420950.2420957 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041150923
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1145/2516760.2516770 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001276888
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1145/2627393.2627417 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016218363
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1145/2666620.2666622 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016264355
126 rdf:type schema:CreativeWork
127 https://www.grid.ac/institutes/grid.16008.3f schema:alternateName University of Luxembourg
128 schema:name Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg
129 rdf:type schema:Organization
130 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
131 schema:name School of Computer Science and Engineering, Pusan National University
132 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...