Abstract
The mouse device, one of the computer peripherals, is an input device that recognizes mouse movements on the two-dimensional plane of a monitor, and it is possible to use it conveniently or inputting and editing during the running of application programs. The existing password-based authentication methods are vulnerable to keyboard-data exposure, so a new authentication method that is based on the mouse input has emerged. Nevertheless, a security assessment of the mouse-based authentication method has not been practically analyzed; for this reason, the exposure of mouse data is evaluated in this paper based on the mouse loggers that can be easily obtained from Web sites. It will be possible to utilize the analyzed result to formulate a security guideline to prevent the exposure of authentication information that is based on the image-based authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wikipedia, Computer_mouse, https://en.wikipedia.org/wiki/Computer_mouse
Kyungroul Lee, Youngtae Choi, Hyeungjun Yeuk, and Kangbin Yim, Password Sniff by Forcing the Keyboard to Replay Scan Codes, Proceedings of the JWIS (Joint Workshop on Information Security), pp.9, Aug. 2010.
Kyungroul Lee and Kangbin Yim, Keyboard Security: A Technological Review, Proceeding of the IMIS (Innovative Mobile and Internet Services in Ubiquitous Computing), pp.9-15, Jun. 2011.
Z Minchev, G Dukov, and S Georgiev, EEG spectral analysis in serious gaming: An ad hoc experimental application, BIO Automation, 13(4), pp.79-88, 2009.
LO4D.com, Mouse Recorder Pro 2, http://mouse-recorder-pro-2.en.lo4d.com
softonic, Axife Mouse Recorder, http://axife-mouse-recorder.en.softonic.com
Download.com, Automatic Mouse and Keyboard, http://download.cnet.com/Automatic-Mouse-and-Keyboard/3000-2084_4-75324350.html
Ghost Mouse, Ghost mouse, http://www.ghost-mouse.com
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Lee, H., Lee, Y., Lee, K., Yim, K. (2017). Security Assessment on the Mouse Data using Mouse Loggers. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)