A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    In some environments (e.g., for government agencies or international corporations), it is challenging to protect and secure confidential information on a computer screen against shoulder surfers who want to access the confidential information by observing the victims computer screen. In this paper, we propose a simple and practical system named STM to mitigate shoulder surfers from reading computer screens by visually shuffling contents on an end users screen. To find an optimal setting for STM, we tested several configurations at character and word levels and showed that STM with a properly chosen configuration is effectively secure against using direct observation techniques.

    Original languageEnglish
    Title of host publicationProceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015
    EditorsJungwoo Ryoo, Hyoungshick Kim
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages7-12
    Number of pages6
    ISBN (Electronic)9781509010783
    DOIs
    Publication statusPublished - 2017 Jan 10
    Event1st International Conference on Software Security and Assurance, ICSSA 2015 - Suwon, Gyeonggi, Korea, Republic of
    Duration: 2015 Jul 27 → …

    Publication series

    NameProceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015

    Other

    Other1st International Conference on Software Security and Assurance, ICSSA 2015
    Country/TerritoryKorea, Republic of
    CitySuwon, Gyeonggi
    Period15/7/27 → …

    Bibliographical note

    Funding Information:
    ACKNOWLEDGMENT This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2013R1A1A1012797) This work was also supported in part by the National Research Foundation of Korea (No. 2014R1A1A1003707), the ITRC (IITP-2015-H8501-15- 1008), and the NIPA (NIPA-2014-H0301-14-1010)

    Publisher Copyright:
    © 2015 IEEE.

    ASJC Scopus subject areas

    • Software
    • Safety, Risk, Reliability and Quality
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers'. Together they form a unique fingerprint.

    Cite this