Back to Search Start Over

Analyzing and Defending <monospace>GhostTouch</monospace> Attack Against Capacitive Touchscreens

Authors :
Wang, Kai
Mitev, Richard
Yan, Chen
Ji, Xiaoyu
Sadeghi, Ahmad-Reza
Xu, Wenyuan
Source :
IEEE Transactions on Dependable and Secure Computing; September 2024, Vol. 21 Issue: 5 p4360-4375, 16p
Publication Year :
2024

Abstract

Capacitive touchscreens have become the primary human-machine interface for personal devices such as smartphones and tablets. In this article, we present &lt;monospace&gt;GhostTouch&lt;/monospace&gt;, the first active contactless attack against capacitive touchscreens. &lt;monospace&gt;GhostTouch&lt;/monospace&gt; uses electromagnetic interference (EMI) to inject fake touch points into a touchscreen without the requirement to physically touch it. By tuning the parameters of the electromagnetic signal and adjusting the antenna, we can inject two types of basic touch events, taps and swipes, into targeted locations of the touchscreen and control them to manipulate the underlying device. We successfully launch the&lt;monospace&gt;GhostTouch&lt;/monospace&gt; attacks on nine smartphone models. We can inject targeted taps continuously with a standard deviation of as low as &lt;inline-formula&gt;&lt;tex-math notation=&quot;LaTeX&quot;&gt;$14.6 \times 19.2$&lt;/tex-math&gt;&lt;alternatives&gt;&lt;mml:math&gt;&lt;mml:mrow&gt;&lt;mml:mn&gt;14&lt;/mml:mn&gt;&lt;mml:mo&gt;.&lt;/mml:mo&gt;&lt;mml:mn&gt;6&lt;/mml:mn&gt;&lt;mml:mo&gt;&#215;&lt;/mml:mo&gt;&lt;mml:mn&gt;19&lt;/mml:mn&gt;&lt;mml:mo&gt;.&lt;/mml:mo&gt;&lt;mml:mn&gt;2&lt;/mml:mn&gt;&lt;/mml:mrow&gt;&lt;/mml:math&gt;&lt;inline-graphic xlink:href=&quot;ji-ieq1-3352593.gif&quot;/&gt;&lt;/alternatives&gt;&lt;/inline-formula&gt; pixels from the target area, and a distance of up to &lt;inline-formula&gt;&lt;tex-math notation=&quot;LaTeX&quot;&gt;$\text{40}\; {\text mm}$&lt;/tex-math&gt;&lt;alternatives&gt;&lt;mml:math&gt;&lt;mml:mrow&gt;&lt;mml:mtext&gt;40&lt;/mml:mtext&gt;&lt;mml:mspace width=&quot;0.277778em&quot;/&gt;&lt;mml:mrow&gt;&lt;mml:mtext&gt;m&lt;/mml:mtext&gt;&lt;mml:mi&gt;m&lt;/mml:mi&gt;&lt;/mml:mrow&gt;&lt;/mml:mrow&gt;&lt;/mml:math&gt;&lt;inline-graphic xlink:href=&quot;ji-ieq2-3352593.gif&quot;/&gt;&lt;/alternatives&gt;&lt;/inline-formula&gt;. We show the real-world impact of the &lt;monospace&gt;GhostTouch&lt;/monospace&gt; attacks in a few proof-of-concept scenarios, including pressing the button, answering an eavesdropping phone call, and swiping up to unlock. Finally, we propose touchscreen reinforcement and attack detection mechanisms to mitigate the threat of &lt;monospace&gt;GhostTouch&lt;/monospace&gt; attack.

Details

Language :
English
ISSN :
15455971
Volume :
21
Issue :
5
Database :
Supplemental Index
Journal :
IEEE Transactions on Dependable and Secure Computing
Publication Type :
Periodical
Accession number :
ejs67340634
Full Text :
https://doi.org/10.1109/TDSC.2024.3352593