Skip to main content

Research Repository

Advanced Search

All Outputs (3)

A pilot study on the security of pattern screen-lock methods and soft side channel attacks (2013)
Conference Proceeding
Andriotis, P., Tryfonas, T., Oikonomou, G., & Yildiz, C. (2013). A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In L. Buttyan, A. Sadeghi, & M. Gruteser (Eds.), Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (1-6). https://doi.org/10.1145/2462096.2462098

Graphical passwords that allow a user to unlock a smartphone's screen are one of the Android operating system's features and many users prefer them instead of traditional textbased codes. A variety of attacks has been proposed against this mechanism,... Read More about A pilot study on the security of pattern screen-lock methods and soft side channel attacks.

Multilevel visualization using enhanced social network analysis with smartphone data (2013)
Journal Article
Andriotis, P., Tzermias, Z., Mparmpaki, A., Ioannidis, S., & Oikonomou, G. (2013). Multilevel visualization using enhanced social network analysis with smartphone data. International Journal of Digital Crime and Forensics, 5(4), 34-54. https://doi.org/10.4018/ijdcf.2013100103

While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in peopleàs lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information.... Read More about Multilevel visualization using enhanced social network analysis with smartphone data.

JPEG steganography detection with Benford's Law (2013)
Journal Article
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2013). JPEG steganography detection with Benford's Law. Digital Investigation, 9(3-4), 246-257. https://doi.org/10.1016/j.diin.2013.01.005

In this paper we present a novel approach to the problem of steganography detection in JPEG images by applying a statistical attack. The method is based on the empirical Benford's Law and, more specifically, on its generalized form. We prove and exte... Read More about JPEG steganography detection with Benford's Law.