Vol. 36
Latest Volume
All Volumes
PIERB 109 [2024] PIERB 108 [2024] PIERB 107 [2024] PIERB 106 [2024] PIERB 105 [2024] PIERB 104 [2024] PIERB 103 [2023] PIERB 102 [2023] PIERB 101 [2023] PIERB 100 [2023] PIERB 99 [2023] PIERB 98 [2023] PIERB 97 [2022] PIERB 96 [2022] PIERB 95 [2022] PIERB 94 [2021] PIERB 93 [2021] PIERB 92 [2021] PIERB 91 [2021] PIERB 90 [2021] PIERB 89 [2020] PIERB 88 [2020] PIERB 87 [2020] PIERB 86 [2020] PIERB 85 [2019] PIERB 84 [2019] PIERB 83 [2019] PIERB 82 [2018] PIERB 81 [2018] PIERB 80 [2018] PIERB 79 [2017] PIERB 78 [2017] PIERB 77 [2017] PIERB 76 [2017] PIERB 75 [2017] PIERB 74 [2017] PIERB 73 [2017] PIERB 72 [2017] PIERB 71 [2016] PIERB 70 [2016] PIERB 69 [2016] PIERB 68 [2016] PIERB 67 [2016] PIERB 66 [2016] PIERB 65 [2016] PIERB 64 [2015] PIERB 63 [2015] PIERB 62 [2015] PIERB 61 [2014] PIERB 60 [2014] PIERB 59 [2014] PIERB 58 [2014] PIERB 57 [2014] PIERB 56 [2013] PIERB 55 [2013] PIERB 54 [2013] PIERB 53 [2013] PIERB 52 [2013] PIERB 51 [2013] PIERB 50 [2013] PIERB 49 [2013] PIERB 48 [2013] PIERB 47 [2013] PIERB 46 [2013] PIERB 45 [2012] PIERB 44 [2012] PIERB 43 [2012] PIERB 42 [2012] PIERB 41 [2012] PIERB 40 [2012] PIERB 39 [2012] PIERB 38 [2012] PIERB 37 [2012] PIERB 36 [2012] PIERB 35 [2011] PIERB 34 [2011] PIERB 33 [2011] PIERB 32 [2011] PIERB 31 [2011] PIERB 30 [2011] PIERB 29 [2011] PIERB 28 [2011] PIERB 27 [2011] PIERB 26 [2010] PIERB 25 [2010] PIERB 24 [2010] PIERB 23 [2010] PIERB 22 [2010] PIERB 21 [2010] PIERB 20 [2010] PIERB 19 [2010] PIERB 18 [2009] PIERB 17 [2009] PIERB 16 [2009] PIERB 15 [2009] PIERB 14 [2009] PIERB 13 [2009] PIERB 12 [2009] PIERB 11 [2009] PIERB 10 [2008] PIERB 9 [2008] PIERB 8 [2008] PIERB 7 [2008] PIERB 6 [2008] PIERB 5 [2008] PIERB 4 [2008] PIERB 3 [2008] PIERB 2 [2008] PIERB 1 [2008]
2011-11-28
Novel Information Leakage Threat for Input Operations on Touch Screen Monitors Caused by Electromagnetic Noise and Its Countermeasure Method
By
Progress In Electromagnetics Research B, Vol. 36, 399-419, 2012
Abstract
Information leakage of general input operations using button images in graphical user interface on touch screen monitors was experimentally investigated from images reconstructed by receiving the electromagnetic noise. In the experimental investigations for input operations of a personal identification number, it was confirmed that when a button image was touched, the touched button image can be identified from the reconstructed button images. This kind of information leakage has originated the fact that the touched button image has changed the color for informing the operator which button image was touched. From the elucidation of the image reconstruction mechanism, it was found that the information leakage has been caused by the magnitude of the emitted signal that results from the analog voltage differences of the RGB signals between neighboring pixels on the monitor. Therefore, a countermeasure method was proposed from the viewpoint of the combination of the colors of the button images and of the background or of the numerals in the button images. The countermeasure method was then applied to the previous input operations of a personal identification number. From the experimental results for the countermeasure method, it was confirmed that the touched button image cannot be identified from the reconstructed button image. As a result, the proposal countermeasure method can prevent effectively the information leakage of input operations on touch screen monitors due to the electromagnetic noise.
Citation
Hidenori Sekiguchi, "Novel Information Leakage Threat for Input Operations on Touch Screen Monitors Caused by Electromagnetic Noise and Its Countermeasure Method," Progress In Electromagnetics Research B, Vol. 36, 399-419, 2012.
doi:10.2528/PIERB11101201
References

1. ISO/IEC 27002 "Information technology --- Security techniques --- | Code of practice for information security management ," International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), 2005.

2. X.1051 "Information Security Management System | Requirements for Telecommunications (ISMS-T)," International Telecommunication Union | Telecommunication Standardization Sector (ITU-T) , 2004.

3. RFC2828 "Internet security glossary," Internet Engineering Task Force, 2000.

4. CISPR 22 "Information technology equipment | Radio disturbance characteristics | Limits and methods of measurement," International Electrotechnical Commission (IEC), 2008.

5. IEC 61000-6-3 "Electromagnetic Compatibility (EMC) --- Part 6-3: Generic Standards --- Emission Standard for Residential," Commercial and Light-Industrial Environments International Electrotechnical Commission (IEC), 2006.

6. K.48 "EMC requirements for telecommunication equipment Product family Recommendation ," International Telecommunication Union | Telecommunication Standardization Sector (ITUT), 2006.

7. MIL-STD-461F "Requirements for the control of electromagnetic interference characteristics of subsystems and equipment," Department of Defense Interface Standard (United State of America), 2007.

8. Van Eck, , W., "Electromagnetic radiation from video display units: An eavesdropping risk?," Computers and Security, Vol. 4, No. 4, 269-286, 1985.

9. Kuhn, , M. G., "Compromising emanations: Eavesdropping risks of computer displays," Tech. Rep. UCAM-CL-TR-577, 2003.

10. Vuagnoux, , M. and S. Pasini, "An improved technique to discover compromising electromagnetic emanations," Proc. 2010 IEEE Int. Symp. EMC, Jul. 2010.

11. Sekiguchi, , H. and S. Seto, "Estimation of receivable distance for radiated disturbance containing information signal from information technology equipment ," Proc. 2011 IEEE Int. Symp. EMC, Aug. 2011.

12. Sekiguchi, H., "Measurement of radiated computer RGB signals," Progress In Electromagnetics Research C, Vol. 7, 1-12, 2009.

13. Sekiguchi, , H. and S. Seto, "Measurement of computer RGB signals in conducted emission on power leads," Progress In Electromagnetics Research C, Vol. 7, 51-64, 2009.

14. Kuhn, , M. G., "Filtered-tempest fonts,".
doi:http://www.cl.cam.ac.uk/~mgk25/emsec/softtempest-faq.html

15. Beyond IT Co., Ltd., CrypType,.
doi:http://CrypType.com

16. Suzuki, , Y. and Y. Akiyama, "Jamming technique to prevent information leakage caused by unintentional emissions of PC video signals ," Proc. 2010 IEEE Int. Symp. EMC, Jul. 2010.

17. Watanabe, T., H. Nagayoshi, T. Urano, T. Uemura, and H. Sako, "Countermeasure for electromagnetic screen image leakage based on color mixing in human brain ," Proc. 2010 IEEE Int. Symp. EMC, Jul. 2010.

18. Sekiguchi, , H., "Information leakage of input operation on touch screen monitors caused by electromagnetic noise," Proc. 2010 IEEE Int. Symp. EMC, Jul. 2010.

19. Sekiguchi, , H., "Software countermeasure technique against information leakage threat of button input operations in display image caused by radiated electromagnetic noise from information equipments ," IEICE Trans., Vol. J92-B, No. 7, 1113-1120, 2009.

20. "Monitor Timing Specifications, Version 1.0, Revision 0.8,", 1998.