基于热残余的密码攻击及其对抗方法

Elizaveta A. Prozorova
{"title":"基于热残余的密码攻击及其对抗方法","authors":"Elizaveta A. Prozorova","doi":"10.1109/SIBCON56144.2022.10002981","DOIUrl":null,"url":null,"abstract":"This article covers possible password attacks, describing thermal residue-based post factum password attacks and the ways to counteract the same, with test results provided as to the possibility of intercepting a password with a thermal imager. In the process of work theoretical material was studied, the methodology of testing the possibility of intercepting passwords, PIN-codes and graphic keys by residual heat trace was developed. The task of testing was that on different models of keyboards, as well as on a smartphone, a set of different combinations of characters, PIN codes and graphic keys was produced, then, using a thermal imager of the UNI-T model UTi260B photographs of the residual thermal trace were taken. The pictures were taken at different distances from the keyboard and after different times of typing the combinations of characters. In the course of this experiment, it was found that it is possible to obtain a sufficiently clear image within one minute after entering the password. However, in order to most successfully reproduce the sequence of the typed characters, the image should be made as early as possible. If the image is taken within fifteen seconds after the password has been entered, success in reproducing the character sequence is achieved in most cases. After thirty seconds, accuracy drops, and after forty-five seconds or more, it becomes increasingly difficult to reproduce the text. In cases of decryption of a graphical key, a similar heat attack makes it possible to reproduce the correct key form even forty seconds after input, as long as the key lines are not superimposed. As a result of the research, methods for counteracting residual heat trace attacks on passwords have been identified and formulated.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Thermal Residue-Based Password Attacks and the Ways to Counteract the Same\",\"authors\":\"Elizaveta A. Prozorova\",\"doi\":\"10.1109/SIBCON56144.2022.10002981\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article covers possible password attacks, describing thermal residue-based post factum password attacks and the ways to counteract the same, with test results provided as to the possibility of intercepting a password with a thermal imager. In the process of work theoretical material was studied, the methodology of testing the possibility of intercepting passwords, PIN-codes and graphic keys by residual heat trace was developed. The task of testing was that on different models of keyboards, as well as on a smartphone, a set of different combinations of characters, PIN codes and graphic keys was produced, then, using a thermal imager of the UNI-T model UTi260B photographs of the residual thermal trace were taken. The pictures were taken at different distances from the keyboard and after different times of typing the combinations of characters. In the course of this experiment, it was found that it is possible to obtain a sufficiently clear image within one minute after entering the password. However, in order to most successfully reproduce the sequence of the typed characters, the image should be made as early as possible. If the image is taken within fifteen seconds after the password has been entered, success in reproducing the character sequence is achieved in most cases. After thirty seconds, accuracy drops, and after forty-five seconds or more, it becomes increasingly difficult to reproduce the text. In cases of decryption of a graphical key, a similar heat attack makes it possible to reproduce the correct key form even forty seconds after input, as long as the key lines are not superimposed. As a result of the research, methods for counteracting residual heat trace attacks on passwords have been identified and formulated.\",\"PeriodicalId\":265523,\"journal\":{\"name\":\"2022 International Siberian Conference on Control and Communications (SIBCON)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Siberian Conference on Control and Communications (SIBCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIBCON56144.2022.10002981\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON56144.2022.10002981","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文介绍了可能的密码攻击,描述了基于热残余的事后密码攻击和抵消方法,并提供了使用热成像仪拦截密码的可能性的测试结果。在研究理论资料的过程中,提出了利用余热迹测试密码、pin码和图形密钥拦截可能性的方法。测试的任务是在不同型号的键盘上,以及在智能手机上,产生一组不同的字符,PIN码和图形键的组合,然后,使用UNI-T型号UTi260B的热像仪拍摄残余热迹的照片。这些照片是在距离键盘不同的距离和键入不同时间的字符组合后拍摄的。在这个实验过程中,我们发现在输入密码后的一分钟内可以获得足够清晰的图像。然而,为了最成功地复制输入字符的序列,应该尽早制作图像。如果在输入密码后15秒内拍摄图像,则在大多数情况下可以成功再现字符序列。30秒后,准确性下降,45秒或更长时间后,复制文本变得越来越困难。在图形密钥解密的情况下,只要密钥行不重叠,即使在输入后40秒,也可以使用类似的热攻击来复制正确的密钥形式。研究的结果是,已经确定并制定了对抗密码余热痕迹攻击的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Thermal Residue-Based Password Attacks and the Ways to Counteract the Same
This article covers possible password attacks, describing thermal residue-based post factum password attacks and the ways to counteract the same, with test results provided as to the possibility of intercepting a password with a thermal imager. In the process of work theoretical material was studied, the methodology of testing the possibility of intercepting passwords, PIN-codes and graphic keys by residual heat trace was developed. The task of testing was that on different models of keyboards, as well as on a smartphone, a set of different combinations of characters, PIN codes and graphic keys was produced, then, using a thermal imager of the UNI-T model UTi260B photographs of the residual thermal trace were taken. The pictures were taken at different distances from the keyboard and after different times of typing the combinations of characters. In the course of this experiment, it was found that it is possible to obtain a sufficiently clear image within one minute after entering the password. However, in order to most successfully reproduce the sequence of the typed characters, the image should be made as early as possible. If the image is taken within fifteen seconds after the password has been entered, success in reproducing the character sequence is achieved in most cases. After thirty seconds, accuracy drops, and after forty-five seconds or more, it becomes increasingly difficult to reproduce the text. In cases of decryption of a graphical key, a similar heat attack makes it possible to reproduce the correct key form even forty seconds after input, as long as the key lines are not superimposed. As a result of the research, methods for counteracting residual heat trace attacks on passwords have been identified and formulated.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信