Skip to main content

2019 | OriginalPaper | Buchkapitel

Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface

verfasst von : Insu Oh, Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Hyo beom Ahn, Kangbin Yim

Erschienen in: Innovative Mobile and Internet Services in Ubiquitous Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The mouse is one of the most widely used I/O devices on a computer. Most user authentication methods are password-based through the keyboard, but there exists a vulnerability through which passwords are exposed through data input, such as keyloggers. Thus, image-based authentication, which authenticates through data input from a mouse, has been discovered. Image-based authentication method is widely used in various Web sites and Internet banking services. This paper analyzes the vulnerability of image-based authentication, which is based on the input data through the mouse. This paper also analyzes an experiment where passwords are exposed by taking mouse data through the PS/2 controller, and we also implemented the proof-of-concept tool and confirm the result of mouse data exposure in the image-based authentication applied in the Internet banking service.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee, K., Bae, K., Yim, K.: Hardware approach to solving password exposure problem through keyboard sniff. In: Proceedings of the Academic Science Research, WASET, Singapore, 26–28 August 2009 Lee, K., Bae, K., Yim, K.: Hardware approach to solving password exposure problem through keyboard sniff. In: Proceedings of the Academic Science Research, WASET, Singapore, 26–28 August 2009
2.
Zurück zum Zitat Lee, S., Lee, K., Yim, K.: Security assessment of keyboard data based on Kaspersky product. In: Proceedings of the International Conference on Broadband and Wireless Computing, Communication (2016) Lee, S., Lee, K., Yim, K.: Security assessment of keyboard data based on Kaspersky product. In: Proceedings of the International Conference on Broadband and Wireless Computing, Communication (2016)
3.
Zurück zum Zitat Sagiroglu, S., Canbek, G.: Keyloggers. IEEE Technol. Soc. Mag. 28(3) (2009)CrossRef Sagiroglu, S., Canbek, G.: Keyloggers. IEEE Technol. Soc. Mag. 28(3) (2009)CrossRef
4.
Zurück zum Zitat Oh, I., Lee, K., Yim, K.: Security assessment of the image-based authentication using screen-capture tools. In: Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Torino, Italy, 10–12 July 2017 Oh, I., Lee, K., Yim, K.: Security assessment of the image-based authentication using screen-capture tools. In: Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Torino, Italy, 10–12 July 2017
5.
Zurück zum Zitat Akula, S., Devisetty, V.: Image based registration and authentication system. In: Proceedings of Midwest Instruction and Computing Symposium, Morris, USA, 16–17 April 2004 Akula, S., Devisetty, V.: Image based registration and authentication system. In: Proceedings of Midwest Instruction and Computing Symposium, Morris, USA, 16–17 April 2004
6.
Zurück zum Zitat Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Math. Comput. Model. 58, 1 (2013)CrossRef Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Math. Comput. Model. 58, 1 (2013)CrossRef
7.
Zurück zum Zitat Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Proceedings of the IEEE International Conference on Convergence and Hybrid Information Technology (ICCIT), Busan, South Korea, 11–13 November 2008 Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Proceedings of the IEEE International Conference on Convergence and Hybrid Information Technology (ICCIT), Busan, South Korea, 11–13 November 2008
8.
Zurück zum Zitat Lee, H., Lee, Y., Lee, K., Yim, K.: Security assessment on the mouse data using mouse loggers. In: Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), Asan, South Korea, 5–7 November 2016 Lee, H., Lee, Y., Lee, K., Yim, K.: Security assessment on the mouse data using mouse loggers. In: Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), Asan, South Korea, 5–7 November 2016
9.
Zurück zum Zitat Chapweske, A.: Computer-engineering (2003) Chapweske, A.: Computer-engineering (2003)
10.
Zurück zum Zitat Chapweske, A.: Computer-engineering (1999) Chapweske, A.: Computer-engineering (1999)
11.
Zurück zum Zitat Chen, X.: Analysis and application of PS/2 device interface protocol. J. Int. Electron. Elem. 4 (2004) Chen, X.: Analysis and application of PS/2 device interface protocol. J. Int. Electron. Elem. 4 (2004)
12.
Zurück zum Zitat Lee, K., Oh, I., Yim, K.: A protection technique for screen image-based authentication protocols utilizing the SetCursorPos function. In: Proceedings of the World conference on Information Security Applications (WISA), Jeju Island, Korea, 24–26 August 2017 Lee, K., Oh, I., Yim, K.: A protection technique for screen image-based authentication protocols utilizing the SetCursorPos function. In: Proceedings of the World conference on Information Security Applications (WISA), Jeju Island, Korea, 24–26 August 2017
13.
Zurück zum Zitat Lee, K., Yim, K.: Vulnerability analysis on the image-based authentication: through the WM_INPUT message. In: Proceedings of the International Workshop on Convergence Information Technology (IWCIT), Busan, Korea, 21–23 December 2017 Lee, K., Yim, K.: Vulnerability analysis on the image-based authentication: through the WM_INPUT message. In: Proceedings of the International Workshop on Convergence Information Technology (IWCIT), Busan, Korea, 21–23 December 2017
14.
Zurück zum Zitat Lee, K., Yim, K.: A protection technique for screen image-based authentication utilizing the WM_INPUT message. In: Proceedings of the Korea Society of Computer Information (KSCI) Conference, Busan, South Korea, 11–13 January 2018 Lee, K., Yim, K.: A protection technique for screen image-based authentication utilizing the WM_INPUT message. In: Proceedings of the Korea Society of Computer Information (KSCI) Conference, Busan, South Korea, 11–13 January 2018
Metadaten
Titel
Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface
verfasst von
Insu Oh
Kyungroul Lee
Sun-Young Lee
Kyunghwa Do
Hyo beom Ahn
Kangbin Yim
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-93554-6_19