Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.4.857

Analysis on Vulnerability of Password Entry Using Virtual Onscreen Keyboard  

Shakirov, Bobur (Inha University)
Kim, Hyejin (Inha University)
Lee, KyungHee (The university of Suwon)
Nyang, DaeHun (Inha University)
Abstract
It is a well-known fact that password based authentication system has been threatened for crucial data leakage through monitoring key log. Recently, to prevent this type of attack using keystroke logging, virtual onscreen keyboards are widely used as one of the solutions. The virtual keyboards, however, also have some crucial vulnerabilities and the major weak point is that important information, such as password, can be exposed by tracking the trajectory of the mouse cursor. Thus, in this paper, we discuss the vulnerabilities of the onscreen keyboard, and present hypothetical attack scenario and a method to crack passwords. Finally to evaluate the performance of the proposed scheme, we demonstrate an example experiment which includes attacking and cracking by utilizing password dictionary and analyze the result.
Keywords
virtual keyboard; onscreen; password cracking;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Mehdi Dadkhah and Mohammad Davarpanah Jazi, "A novel approach to deal with keyloggers," Oriental Journal of Computer Science & Technology, Vol. 7, no. 1, pp. 25-28, Apr. 2014
2 Ankit Parekh, Ajinkya Pawar, Pratik Munot and Piyush Mantri, "Secure authentication using anti-screenshot virtual keyboard," International Journal of Computer Science Issues, Vol. 8, Issue 5, pp. 534-537, Sep. 2011
3 Alexander De Luca, Emanuelvon Zezschwitz, Laurent Pichler and Heinrich Hussmann, "Using fake cursors to secure on-screen password entry," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2399-2402, Apr. 2013
4 Keita Watanabe, Fumito Higuchi, Masahiko Inami, and Takeo Igarashi, "CursorCamouflage: multiple dummy cursors as a defense against shoulder surfing," SIGGRAPH Asia 2012 Emerging Technologies, no. 6, pp. 15-16, Nov. 2012
5 https://wiki.skullsecurity.org/Passwords