Browse > Article
http://dx.doi.org/10.3837/tiis.2021.05.016

State of the Art of Anti-Screen Capture Protection Techniques  

Lee, Young (Department of Mathematical Sciences, KAIST)
Hahn, SangGeun (Department of Mathematical Sciences, KAIST)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.5, 2021 , pp. 1871-1890 More about this Journal
Abstract
The transition toward a contactless society has been rapidly progressing owing to the recent COVID-19 pandemic. As a result, the IT environment of organizations and enterprises is changing rapidly; in particular, data security is expanding to the private sector. To adapt to these changes, organizations and companies have started to securely transfer confidential data to residential PCs and personally owned devices of employees working from home or from other locations. Therefore, organizations and companies are introducing streaming data services, such as the virtual desktop infrastructure (VDI) or cloud services, to securely connect internal and external networks. These methods have the advantage of providing data without the need to download to a third terminal; however, while the data are being streamed, attacks such as screen shooting or capturing are performed. Therefore, there is an increasing interest in prevention techniques against screen capture threats that may occur in a contactless environment. In this study, we analyze possible screen capture methods in a PC and a mobile phone environment and present techniques that can protect the screens against specific attack methods. The detection and defense for screen capture of PC applications on Windows OS and Mac OS could be solved with a single agent using our proposed techniques. Screen capture of mobile devices can be prevented by applying our proposed techniques on Android and iOS.
Keywords
Agent; API Level 17; Capture prevention; Detours hooking; Fairplay DRM; Profile;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Y. Jang, Windows Architecture and Principles: Principles of Programming through the OS, Seoul, Korea: Hanbit Media, 2006, Ch. 14.
2 J. Richter, Advanced Windows Third Edition, Microsoft Press, 2006.
3 E. N. Dekker and J. M. Newcomer, Developing Windows NT Device Drivers, Microsoft Press, 1999.
4 J. Prosise, Programming Windows with MFC, Washington, USA:Microsoft Press, 2001.
5 C. Petzold, Bitmaps and bitblts, in Programming Windows, 5th ed, Washington, USA: Microsoft Press, 1998, Ch. 14, pp. 641-711.
6 Y. Lee, D. H. Hwang and S. W. Kwak, "Security program and computing device for providing security function per each user session and method therefore," ROK. Patent 10 2019 0025814, Mar. 7, 2019.
7 M. Pierer, Mobile Device Management, Wiesbaden: Springer Fachmedien Wiesbaden, 2016.
8 D. Till, J. Lee and S. Lee, iOS Application Security, Seoul, Korea, Acorn Publishing Co., 2017.
9 Y. Lee and Y. Y. Yu, "Computer program for preventing information spill displayed on display device and security service using the same," ROK. Patent pending 10 2020 0053260, May, 4, 2020.
10 D. Eran, "How Fairplay Works: Apple's iTunes DRM Dilemma," Internet archive Available: (archive.org) 3, Mar., 2007. [Online]. Available: https://web.archive.org/web/20170927030905/http:/www.roughlydrafted.com/RD/RDM.Tech.Q1.07/2A351C60-A4E5-4764-A083-FF8610E66A46.html
11 M. Rouse and J. Madden, "Desktop virtualization," Tech target.
12 S. G. Yoon and D. H. Hwang, "Method for managing secure access of mobile application," ROK. Patent 10 1420 3830000, Oct., 16, 2012. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/3830000
13 C. Petzold, Blocking by examining the handle value using the hooking technique of the detours method, in Programming Windows, 5th ed, Washington, USA: Microsoft Press, 1998, Ch. 21, pp. 1243-1266.
14 E. Diehi, Securing digital video techniques for DRM and content protection, Berlin, German: Springer Berlin Heidelberg, 2012.
15 M. Ashish and D. Vedvyas, Watermarking Techniques for Copyright Protection of Videos, Springer International Publishing, 2019.
16 Y. Lee and D. H. Hwang, "Computer program to prevent leakage of information on display device and security service using it," ROK. Patent 10 2018 0020509, Feb., 21, 2018.
17 C. Petzold, The clipboard, in Programming Windows, 5th ed, Washington, USA: Microsoft Press, 1998, Ch. 12, pp. 567-590.
18 K. Makan and S. Alexander-Bown, Android Security Cookbook, Birmingham, UK: Packt Publishing Limited, 2013.
19 J. A. Siegel and P. J. Saukko, Fingerprints, in Encyclopedia of Forensic Sciences, 2nd ed, Oxford, UK: Elsevier Science & Technology, pp. 346-351, 2013.
20 F. Rahman, M. Farmani, M. Tehranipoor and Y. Jin, "Hardware-assisted cybersecurity for IoT devices," in Proc. of 18th International Workshop on Microprocessor and Social Testing, Security and Verification, TX, USA: MTV, pp. 51-56, 2017.
21 J. H. Yu, "Apparatus and method for scene (screen) capture security," ROK. Patent 10 1403 6950000, May, 28, 2014.