PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens
The wired ghost touch attacks are the emerging and severe threats against modern touchscreens. The attackers can make touchscreens falsely report nonexistent touches (i.e., ghost touches) by injecting common-mode noise (CMN) into the target devices via power cables. Existing attacks rely on reverse-...
Gespeichert in:
| Veröffentlicht in: | 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD) S. 1 - 9 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
ACM
29.10.2022
|
| Schlagworte: | |
| ISSN: | 1558-2434 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The wired ghost touch attacks are the emerging and severe threats against modern touchscreens. The attackers can make touchscreens falsely report nonexistent touches (i.e., ghost touches) by injecting common-mode noise (CMN) into the target devices via power cables. Existing attacks rely on reverse-engineering the touchscreens, then manually crafting the CMN waveforms to control the types and locations of ghost touches. Although successful, they are limited in practicality and attack capability due to the touchscreens' black-box nature and the immense search space of attack parameters. To overcome the above limitations, this paper presents PowerTouch, a framework that can automatically generate wired ghost touch attacks. We adopt a software-hardware co-design approach and propose a domain-specific genetic algorithm-based method that is tailored to account for the characteristics of the CMN waveform. Based on the security objectives, our framework automatically optimizes the CMN waveform towards injecting the desired type of ghost touches into regions specified by attackers. The effectiveness of PowerTouch is demonstrated by successfully launching attacks on touchscreen devices from two different brands given nine different objectives. Compared with the state-of-the-art attack, we seminally achieve controlling taps on an extra dimension and injecting swipes on both dimensions. We can place an average of 84.2% taps on the targeted side of the screen, with the location error in the other dimension no more than 1.53mm. An average of 94.5% of injected swipes with correct directions is also achieved. The quantitative comparison with the state-of-the-art method shows that a better attack performance can be achieved by PowerTouch. |
|---|---|
| AbstractList | The wired ghost touch attacks are the emerging and severe threats against modern touchscreens. The attackers can make touchscreens falsely report nonexistent touches (i.e., ghost touches) by injecting common-mode noise (CMN) into the target devices via power cables. Existing attacks rely on reverse-engineering the touchscreens, then manually crafting the CMN waveforms to control the types and locations of ghost touches. Although successful, they are limited in practicality and attack capability due to the touchscreens' black-box nature and the immense search space of attack parameters. To overcome the above limitations, this paper presents PowerTouch, a framework that can automatically generate wired ghost touch attacks. We adopt a software-hardware co-design approach and propose a domain-specific genetic algorithm-based method that is tailored to account for the characteristics of the CMN waveform. Based on the security objectives, our framework automatically optimizes the CMN waveform towards injecting the desired type of ghost touches into regions specified by attackers. The effectiveness of PowerTouch is demonstrated by successfully launching attacks on touchscreen devices from two different brands given nine different objectives. Compared with the state-of-the-art attack, we seminally achieve controlling taps on an extra dimension and injecting swipes on both dimensions. We can place an average of 84.2% taps on the targeted side of the screen, with the location error in the other dimension no more than 1.53mm. An average of 94.5% of injected swipes with correct directions is also achieved. The quantitative comparison with the state-of-the-art method shows that a better attack performance can be achieved by PowerTouch. |
| Author | Yu, Zhiyuan Zhu, Huifeng Zhang, Xuan Cao, Weidong Zhang, Ning |
| Author_xml | – sequence: 1 givenname: Huifeng surname: Zhu fullname: Zhu, Huifeng organization: Washington University in St.Louis,MO,USA – sequence: 2 givenname: Zhiyuan surname: Yu fullname: Yu, Zhiyuan organization: Washington University in St.Louis,MO,USA – sequence: 3 givenname: Weidong surname: Cao fullname: Cao, Weidong organization: Washington University in St.Louis,MO,USA – sequence: 4 givenname: Ning surname: Zhang fullname: Zhang, Ning organization: Washington University in St.Louis,MO,USA – sequence: 5 givenname: Xuan surname: Zhang fullname: Zhang, Xuan organization: Washington University in St.Louis,MO,USA |
| BookMark | eNotjM1OAjEYRavRRETWblz0BQb7S1t3EyKjCQkmYlyS0vlGCjI1bQfC2ztBVze5955zi67a0AJC95SMKRXykUuiuWRjLoXhRl6gkVG6Hwg3jCpxiQZUSl0wwcUNGqW0JYQwrahSZIC6t3CEuAyd2zzhEr-D66LPJ7xYb8Flf4Ci6nwNNS67HPY2-9DiWbR7OIa4w02IuIIWYj-0X_jTx_5ZbULK-KzEZc7W7RLuqXORXARo0x26bux3gtF_DtHH7Hk5fSnmi-p1Ws4Ly4TOBTBuiZFSWLUWqnF13UjSWHC1FsJZLYVSptGsMVrTeqJqo4AAWUvXg4JSPkQPf14PAKuf6Pc2nlaUkIk2XPNfXFVfGg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1145/3508352.3549395 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781450392174 1450392172 |
| EISSN | 1558-2434 |
| EndPage | 9 |
| ExternalDocumentID | 10068938 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Arm funderid: 10.13039/100016311 – fundername: National Science Foundation funderid: 10.13039/100000001 |
| GroupedDBID | 6IE 6IF 6IH 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO FEDTE IEGSK IJVOP M43 OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a248t-e23a09554a7b47fcddf50faecd844ca854779f82f9881d67d97e0e0b5c23a4113 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000981574300066&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:46:23 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a248t-e23a09554a7b47fcddf50faecd844ca854779f82f9881d67d97e0e0b5c23a4113 |
| PageCount | 9 |
| ParticipantIDs | ieee_primary_10068938 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-Oct.-29 |
| PublicationDateYYYYMMDD | 2022-10-29 |
| PublicationDate_xml | – month: 10 year: 2022 text: 2022-Oct.-29 day: 29 |
| PublicationDecade | 2020 |
| PublicationTitle | 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD) |
| PublicationTitleAbbrev | ICCAD |
| PublicationYear | 2022 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssj0002871770 ssj0020286 |
| Score | 2.2537527 |
| Snippet | The wired ghost touch attacks are the emerging and severe threats against modern touchscreens. The attackers can make touchscreens falsely report nonexistent... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Aerospace electronics Automation Closed box Design automation Power cables Touch sensitive screens |
| Title | PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens |
| URI | https://ieeexplore.ieee.org/document/10068938 |
| WOSCitedRecordID | wos000981574300066&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoxQALX0V8ywNrSj6c2GarEC0DKpUoUrcqsc-iDA0qCb-fOyctXRjYopMcRXbie-e8d4-xW2dzTBPWBoBgPBAJpEEeGwiM1JGLBZgo9ULhZzkeq9lMT1qxutfCAIAnn0GfLv2_fFuamo7K8AsPM8yvqsM6UmaNWGtzoELQX9LL11ZbGMjaXj6RSO-S1IONfoIFUUJuEltmKj6XDA_--RSHrPeryuOTTb45YjuwPGb7Ww0FT1g9IdOzaVmb93s-4K-tOR1_KT6ajS0Y1QsLlg_qqmxEi3y4pmdxxK-8aUNNXGhOxFjLRyQD4f6WfFBVJMnnOMoHcMuhMrjH3oaP04enoDVWwHUQqgogTnJqPSdyWQjpjLUuDV0OxiohTK5SIaV2KnZaIZzNpNUSQgiL1OBAEUXJKesuyyWcMW4KSfEMC0ktCm11IaxCFKWJjpKDPmc9msH5Z9M7Y76evIs_4pdsLyaBAWaHWF-xbrWq4Zrtmu9q8bW68Sv-A5hariw |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELWgIAELX0V844E1JR92bLNViLaIUipRpG5VYl_UMjSoJPx-fE5aujCwRSc5iuzE98557x4ht5lJbJowxgMLxj0WAfeSUIOnhQqykIEOuBMK98VgIMdjNazF6k4LAwCOfAYtvHT_8k2uSzwqs1-4H9v8KjfJFmcs9Cu51upIBcG_wNevrrdsIK67-QSM30XcwY1WZEuiCP0k1uxUXDbp7P_zOQ5I81eXR4erjHNINmB-RPbWWgoek3KItmejvNTTe9qmb7U9HX1NP6qtzeuWMwOGtssir2SLtLMkaFGLYGnViBrZ0BSpsYZ2UQhC3S1puyhQlE_tKBewmw4Wwk3y3nkcPfS82lrBrgSThQdhlGDzOZaIlIlMG5NxP0tAG8mYTiRnQqhMhpmSFtDGwigBPvgp13YgC4LohDTm-RxOCdWpwHhsS0nFUmVUyoy0OEohISUBdUaaOIOTz6p7xmQ5eed_xG_ITm_00p_0nwbPF2Q3RLmBzRWhuiSNYlHCFdnW38Xsa3HtVv8H02Oxcw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+IEEE%2FACM+International+Conference+On+Computer+Aided+Design+%28ICCAD%29&rft.atitle=PowerTouch%3A+A+Security+Objective-Guided+Automation+Framework+for+Generating+Wired+Ghost+Touch+Attacks+on+Touchscreens&rft.au=Zhu%2C+Huifeng&rft.au=Yu%2C+Zhiyuan&rft.au=Cao%2C+Weidong&rft.au=Zhang%2C+Ning&rft.date=2022-10-29&rft.pub=ACM&rft.eissn=1558-2434&rft.spage=1&rft.epage=9&rft_id=info:doi/10.1145%2F3508352.3549395&rft.externalDocID=10068938 |