• Title/Summary/Keyword: 27MHz Wireless Keyboard

Search Result 2, Processing Time 0.016 seconds

Vulnerability Verification of 27 MHz Wireless Keyboards (27MHz 무선 키보드의 취약성 분석)

  • Kim, Ho-Yeon;Sim, Bo-Yeon;Park, Ae-Sun;Han, Dong-Guk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2145-2152
    • /
    • 2016
  • Internet generalization has led to increased demands for Internet banking. Various security programs to protect authentication information are being developed; however, these programs cannot protect the wireless communication sections of wireless keyboards. In particular, vulnerabilities have been reported in the radio communication sections of 27 MHz wireless keyboards. In this paper, we explain how to analyze M's 27 MHz wireless keyboard. We also experimentally show that an attacker can acquire authentication information during domestic Internet banking using a 27 MHz wireless keyboard. To do this, we set up an experimental encironment to analyze the electromagnetic signal of a 27 MHz wireless keyboard.

Analysis of 27MHz Wireless Keyboard Electromagnetic Signal Using USRP and GNU Radio (USRP와 GNU Radio를 이용한 27MHz 무선 키보드 전자파 신호 분석)

  • Kim, Ho-Yeon;Sim, Bo-Yeon;Park, Ae-Sun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.81-91
    • /
    • 2016
  • Nowadays, electronic device is in a close relationship with human life. Above all, the use of wireless electronic devices such as smart phone, tablet pc, and wireless keyboard is increasing owing to the high convenience and portability. Furthermore, according to the increasing use of sensitive personal and financial information from the electronic device, various attacks for stealing information are being reported. In this paper we do an analysis of 27MHz wireless keyboard vulnerability and set up an analysis environment. Moreover, we make an experiment and show that there are real vulnerabilities. An experimental result will be used for safety analysis and vulnerability verification of wireless electronic devices.