Abstract
In this chapter, we demonstrate and evaluate the effectiveness and usefulness of the developed software prototype CogTool+. In particular, we present our work of using CogTool+ to model three existing systems. The first system is an observer-resistant password system called Undercover; the second one is a 6-digit PIN entry system, and the third one is data entry interfaces (part of this chapter will appear in a full paper which is currently under review. (Yuan, H., Li, S., Rusconi, P., “CogTool+: Modeling human performance at large scale”.))
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Based on these behavior patterns, we developed reusable JavaScript-based behavior template database patterns as part of the CogTool+ software.
- 2.
More information of 50 PINs used in this study can be found in [1].
References
Liu, X., Li, Y., Deng, R.H., Chang, B., Li, S.: When human cognitive modeling meets pins: user-independent inter-keystroke timing attacks. Comput. Secur. 80, 90–107 (2019). http://www.sciencedirect.com/science/article/pii/S0167404818302736
Oladimeji, P., Thimbleby, H.W., Cox, A.L.: A performance review of number entry interfaces. In: INTERACT (2013)
Perković, T., Li, S., Mumtaz, A., Khayam, S., Javed, Y., Čagalj, M.: Breaking undercover: exploiting design flaws and nonuniform human behavior. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 5:1–5:15. SOUPS ’11. ACM, New York (2011). https://doi.org/10.1145/2078827.2078834
Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 183–192. CHI ’08. ACM, New York (2008). https://doi.org/10.1145/1357054.1357085
Woodman, G.F., Chun, M.M.: The role of working memory and long-term memory in visual search. Vis. Cogn. 14(4–8), 808–830 (2006). https://doi.org/10.1080/13506280500197397
Woodman, G.F., Luck, S.J.: Visual search is slowed when visuospatial working memory is occupied. Psychon. Bull. Rev. 11(2), 269–274 (2004). https://doi.org/10.3758/BF03196569
Yuan, H., Li, S., Rusconi, P., Aljaffan, N.: When eye-tracking meets cognitive modeling: Applications to cyber security systems. In: Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, July 9–14, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10292, pp. 251–264. Springer, Cham (2017)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Yuan, H., Li, S., Rusconi, P. (2020). Example Applications of CogTool+. In: Cognitive Modeling for Automated Human Performance Evaluation at Scale . Human–Computer Interaction Series(). Springer, Cham. https://doi.org/10.1007/978-3-030-45704-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-45704-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-45703-7
Online ISBN: 978-3-030-45704-4
eBook Packages: Computer ScienceComputer Science (R0)