Skip to main content

Part of the book series: Human–Computer Interaction Series ((BRIEFSHUMAN))

Abstract

In this chapter, we demonstrate and evaluate the effectiveness and usefulness of the developed software prototype CogTool+. In particular, we present our work of using CogTool+ to model three existing systems. The first system is an observer-resistant password system called Undercover; the second one is a 6-digit PIN entry system, and the third one is data entry interfaces (part of this chapter will appear in a full paper which is currently under review. (Yuan, H., Li, S., Rusconi, P., “CogTool+: Modeling human performance at large scale”.))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Based on these behavior patterns, we developed reusable JavaScript-based behavior template database patterns as part of the CogTool+ software.

  2. 2.

    More information of 50 PINs used in this study can be found in [1].

References

  1. Liu, X., Li, Y., Deng, R.H., Chang, B., Li, S.: When human cognitive modeling meets pins: user-independent inter-keystroke timing attacks. Comput. Secur. 80, 90–107 (2019). http://www.sciencedirect.com/science/article/pii/S0167404818302736

    Article  Google Scholar 

  2. Oladimeji, P., Thimbleby, H.W., Cox, A.L.: A performance review of number entry interfaces. In: INTERACT (2013)

    Google Scholar 

  3. Perković, T., Li, S., Mumtaz, A., Khayam, S., Javed, Y., Čagalj, M.: Breaking undercover: exploiting design flaws and nonuniform human behavior. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 5:1–5:15. SOUPS ’11. ACM, New York (2011). https://doi.org/10.1145/2078827.2078834

  4. Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 183–192. CHI ’08. ACM, New York (2008). https://doi.org/10.1145/1357054.1357085

  5. Woodman, G.F., Chun, M.M.: The role of working memory and long-term memory in visual search. Vis. Cogn. 14(4–8), 808–830 (2006). https://doi.org/10.1080/13506280500197397

    Article  Google Scholar 

  6. Woodman, G.F., Luck, S.J.: Visual search is slowed when visuospatial working memory is occupied. Psychon. Bull. Rev. 11(2), 269–274 (2004). https://doi.org/10.3758/BF03196569

    Article  Google Scholar 

  7. Yuan, H., Li, S., Rusconi, P., Aljaffan, N.: When eye-tracking meets cognitive modeling: Applications to cyber security systems. In: Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, July 9–14, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10292, pp. 251–264. Springer, Cham (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yuan, H., Li, S., Rusconi, P. (2020). Example Applications of CogTool+. In: Cognitive Modeling for Automated Human Performance Evaluation at Scale . Human–Computer Interaction Series(). Springer, Cham. https://doi.org/10.1007/978-3-030-45704-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-45704-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-45703-7

  • Online ISBN: 978-3-030-45704-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics