A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In some environments (e.g., for government agencies or international corporations), it is challenging to protect and secure confidential information on a computer screen against shoulder surfers who want to access the confidential information by observing the victims computer screen. In this paper, we propose a simple and practical system named STM to mitigate shoulder surfers from reading computer screens by visually shuffling contents on an end users screen. To find an optimal setting for STM, we tested several configurations at character and word levels and showed that STM with a properly chosen configuration is effectively secure against using direct observation techniques.

Original languageEnglish
Title of host publicationProceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages7-12
Number of pages6
ISBN (Electronic)9781509010783
DOIs
Publication statusPublished - 2017 Jan 10
Event1st International Conference on Software Security and Assurance, ICSSA 2015 - Suwon, Gyeonggi, Korea, Republic of
Duration: 2015 Jul 27 → …

Other

Other1st International Conference on Software Security and Assurance, ICSSA 2015
CountryKorea, Republic of
CitySuwon, Gyeonggi
Period15/7/27 → …

Fingerprint

Industry

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Cite this

Kim, H., Kim, H., & Yoon, J. W. (2017). A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. In Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015 (pp. 7-12). [7812939] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICSSA.2015.012

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. / Kim, Hyunsoo; Kim, Hyoungshick; Yoon, Ji Won.

Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc., 2017. p. 7-12 7812939.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, H, Kim, H & Yoon, JW 2017, A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. in Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015., 7812939, Institute of Electrical and Electronics Engineers Inc., pp. 7-12, 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, Gyeonggi, Korea, Republic of, 15/7/27. https://doi.org/10.1109/ICSSA.2015.012
Kim H, Kim H, Yoon JW. A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. In Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc. 2017. p. 7-12. 7812939 https://doi.org/10.1109/ICSSA.2015.012
Kim, Hyunsoo ; Kim, Hyoungshick ; Yoon, Ji Won. / A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc., 2017. pp. 7-12
@inproceedings{de9d6152c8a0465c98c5a30fc6e11c3a,
title = "A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers",
abstract = "In some environments (e.g., for government agencies or international corporations), it is challenging to protect and secure confidential information on a computer screen against shoulder surfers who want to access the confidential information by observing the victims computer screen. In this paper, we propose a simple and practical system named STM to mitigate shoulder surfers from reading computer screens by visually shuffling contents on an end users screen. To find an optimal setting for STM, we tested several configurations at character and word levels and showed that STM with a properly chosen configuration is effectively secure against using direct observation techniques.",
author = "Hyunsoo Kim and Hyoungshick Kim and Yoon, {Ji Won}",
year = "2017",
month = "1",
day = "10",
doi = "10.1109/ICSSA.2015.012",
language = "English",
pages = "7--12",
booktitle = "Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

AU - Kim, Hyunsoo

AU - Kim, Hyoungshick

AU - Yoon, Ji Won

PY - 2017/1/10

Y1 - 2017/1/10

N2 - In some environments (e.g., for government agencies or international corporations), it is challenging to protect and secure confidential information on a computer screen against shoulder surfers who want to access the confidential information by observing the victims computer screen. In this paper, we propose a simple and practical system named STM to mitigate shoulder surfers from reading computer screens by visually shuffling contents on an end users screen. To find an optimal setting for STM, we tested several configurations at character and word levels and showed that STM with a properly chosen configuration is effectively secure against using direct observation techniques.

AB - In some environments (e.g., for government agencies or international corporations), it is challenging to protect and secure confidential information on a computer screen against shoulder surfers who want to access the confidential information by observing the victims computer screen. In this paper, we propose a simple and practical system named STM to mitigate shoulder surfers from reading computer screens by visually shuffling contents on an end users screen. To find an optimal setting for STM, we tested several configurations at character and word levels and showed that STM with a properly chosen configuration is effectively secure against using direct observation techniques.

UR - http://www.scopus.com/inward/record.url?scp=85013643850&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85013643850&partnerID=8YFLogxK

U2 - 10.1109/ICSSA.2015.012

DO - 10.1109/ICSSA.2015.012

M3 - Conference contribution

SP - 7

EP - 12

BT - Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -