Novel Information Leakage Threat for In- Put Operations on Touch Screen Monitors Caused by Electromagnetic Noise and Its Countermeasure Method
نویسنده
چکیده
Information leakage of general input operations using button images in graphical user interface on touch screen monitors was experimentally investigated from images reconstructed by receiving the electromagnetic noise. In the experimental investigations for input operations of a personal identification number, it was confirmed that when a button image was touched, the touched button image can be identified from the reconstructed button images. This kind of information leakage has originated the fact that the touched button image has changed the color for informing the operator which button image was touched. From the elucidation of the image reconstruction mechanism, it was found that the information leakage has been caused by the magnitude of the emitted signal that results from the analog voltage differences of the RGB signals between neighboring pixels on the monitor. Therefore, a countermeasure method was proposed from the viewpoint of the combination of the colors of the button images and of the background or of the numerals in the button images. The countermeasure method was then applied to the previous input operations of a personal identification number. From the experimental results for the countermeasure method, it was confirmed that the touched button image cannot be identified from the reconstructed button image. As a result, the proposal countermeasure method can prevent effectively the information leakage of input operations on touch screen monitors due to the electromagnetic noise. Received 12 October 2011, Accepted 17 November 2011, Scheduled 28 November 2011 * Corresponding author: Hidenori Sekiguchi ([email protected]).
منابع مشابه
Electromagnetic Radiofrequency Radiation Emitted from GSM Mobile Phones Decreases the Accuracy of Home Blood Glucose Monitors
Mobile phones are two-way radios that emit electromagnetic radiation in microwave range. As the number of mobile phone users has reached 6 billion, the bioeffects of exposure to mobile phone radiation and mobile phone electromagnetic interference with electronic equipment have received more attention, globally. As self-monitoring of blood glucose can be a beneficial part of diabetes control, ho...
متن کاملAnalysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage
Electromagnetic information leak as a potential data security risk is more and more serious. Discussing the relationship between compromising emanations and Hamming distance is directed to preventing or reducing the electromagnetic information leakage. The paper presents the model of electromagnetic information leak, then the hierarchical protection strategy based on the model is proposed, that...
متن کاملCountermeasure Technique for Preventing Information Leakage Caused by Unintentional PC Display Emanations
A working personal computer (PC) and/or a PC display monitor usually produce unintentional electromagnetic fields. It has been known that the information from a video display unit could be reconstructed by intercepting such emissions at a distance. Proper measures are needed to prevent information leakage against such eavesdropping, which are often collectively called “TEMPEST”. We have studied...
متن کاملA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملA novel ranking method for intuitionistic fuzzy set based on information fusion and application to threat assessment
A novel ranking method based on multi-time information fusion is proposed for intuitionistic fuzzy sets (IFSs) and applied to the threat assessment problem, a multi-attribute decision making (MADM) one. This method integrates a designed intuitionistic fuzzy entropy (IFE), the closeness degree of technique for order preference by similarity to ideal solution (TOPSIS), the decision maker¡¯s (DM¡¯...
متن کامل