TY - GEN
T1 - Side channel attack on digital door lock with vibration signal analysis
T2 - 13th IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, MFI 2017
AU - Ha, Youngmok
AU - Jang, Soo Hee
AU - Kim, Kwang Won
AU - Yoon, Ji Won
N1 - Funding Information:
*This work was supported by the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (NRF-2016M1B3A1A01937737) 1Youngmok Ha is with Electronics and Telecommunications Research Institute, 218 Gajeong-ro, Yuseong-gu, Daejeon, 34129, Republic of Korea (ymha@etri.re.kr) 2Soo-Hee Jang, Kwang-Won Kim and Ji Won Yoon are with Graduate School of Information Security, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul, 02841, Republic of Korea (jiwon yoon@korea.ac.kr)
PY - 2017/12/7
Y1 - 2017/12/7
N2 - Digital door lock system is a widely used physical security system. It restricts unauthorized accesses and protects assets or private spaces. However, once its password has been exposed to unauthorized people, it becomes useless. In this paper, we propose a novel side channel attack model, which enables a cracking of a digital door lock password. We noted that when people press the key-lock button, irrespective of how careful they are, the generated vibrations differ with the location of the button pressed. Our model uses and analyzes the natural phenomenon of vibration to infer passwords. Under our attack, the ease of password inference depends on the number of distinguishable buttons rather than password length. The results of our experiments contradict the commonly held security principle that a longer password guarantees a higher level of security.
AB - Digital door lock system is a widely used physical security system. It restricts unauthorized accesses and protects assets or private spaces. However, once its password has been exposed to unauthorized people, it becomes useless. In this paper, we propose a novel side channel attack model, which enables a cracking of a digital door lock password. We noted that when people press the key-lock button, irrespective of how careful they are, the generated vibrations differ with the location of the button pressed. Our model uses and analyzes the natural phenomenon of vibration to infer passwords. Under our attack, the ease of password inference depends on the number of distinguishable buttons rather than password length. The results of our experiments contradict the commonly held security principle that a longer password guarantees a higher level of security.
UR - http://www.scopus.com/inward/record.url?scp=85042358211&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85042358211&partnerID=8YFLogxK
U2 - 10.1109/MFI.2017.8170414
DO - 10.1109/MFI.2017.8170414
M3 - Conference contribution
AN - SCOPUS:85042358211
T3 - IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems
SP - 103
EP - 110
BT - MFI 2017 - 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 16 November 2017 through 18 November 2017
ER -