2016
DOI: 10.1109/tdsc.2015.2413410
|View full text |Cite
|
Sign up to set email alerts
|

Password Extraction via Reconstructed Wireless Mouse Trajectory

Abstract: Logitech made the following statement in 2009: "Since the displacements of a mouse would not give any useful information to a hacker, the mouse reports are not encrypted." In this paper, we prove the exact opposite is true -i.e., it is indeed possible to leak sensitive information such as passwords through the displacements of a Bluetooth mouse. Our results can be easily extended to other wireless mice using different radio links. We begin by presenting multiple ways to sniff unencrypted Bluetooth packets cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…This Survey represents a study of password extraction Methods [1] for different Indian scripts .This paper helps researchers and developers to understand history of the wireless mouse data leakage research work for Indian scripts. This survey will be helpful for researchers in this field.In this paper, an analysis of privacy leakage from unencrypted Bluetooth mouse traffic is carried out.…”
Section: Discussionmentioning
confidence: 99%
“…This Survey represents a study of password extraction Methods [1] for different Indian scripts .This paper helps researchers and developers to understand history of the wireless mouse data leakage research work for Indian scripts. This survey will be helpful for researchers in this field.In this paper, an analysis of privacy leakage from unencrypted Bluetooth mouse traffic is carried out.…”
Section: Discussionmentioning
confidence: 99%
“…Because high security is essentially required to protect critical physical infrastructure and sensitive data [34]. Once a hacker/attacker gained access to unprotected device, cyber security system may be compromised [35].and it can lead to serious circumstances such as collecting the data from smart house can reveal the owner activities [36], [37], monitoring the power consumption can also disclose routine life [38]. Furthermore, false data injection [39]- [41], attacks up against data integrity [42], [43] and so on.…”
Section: Previous Work In Architecture Of Iotmentioning
confidence: 99%
“…Password base authentication is one of the simplest form of authentication as it reduces the human effort to a great extent during the identity verification (Bonneau et al, 2012). Being usable, this factor of authentication has been challenged under different kind of threats over the times (Marechal, 2008) (Pinkas and Sander, 2002) (Kim et al, 2016) (Pan et al, 2016) (Halevi and Saxena, 2015) . Though most of these threats have been successfully handled (Manulis et al, 2016) (Kontaxis et al, 2013), there are a few, particularly those which involve human intelligence factor, are continuously challenging researchers in developing some efficient algorithm to tackle the breaches.…”
Section: Introductionmentioning
confidence: 99%