A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In some environments (e.g., for government agencies or international corporations), it is challenging to protect and secure confidential information on a computer screen against shoulder surfers who want to access the confidential information by observing the victims computer screen. In this paper, we propose a simple and practical system named STM to mitigate shoulder surfers from reading computer screens by visually shuffling contents on an end users screen. To find an optimal setting for STM, we tested several configurations at character and word levels and showed that STM with a properly chosen configuration is effectively secure against using direct observation techniques.

Original languageEnglish
Title of host publicationProceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages7-12
Number of pages6
ISBN (Electronic)9781509010783
DOIs
Publication statusPublished - 2017 Jan 10
Event1st International Conference on Software Security and Assurance, ICSSA 2015 - Suwon, Gyeonggi, Korea, Republic of
Duration: 2015 Jul 27 → …

Other

Other1st International Conference on Software Security and Assurance, ICSSA 2015
CountryKorea, Republic of
CitySuwon, Gyeonggi
Period15/7/27 → …

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers'. Together they form a unique fingerprint.

  • Cite this

    Kim, H., Kim, H., & Yoon, J. W. (2017). A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. In Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015 (pp. 7-12). [7812939] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICSSA.2015.012