Security Assessment on the Mouse Data using Mouse Loggers
The mouse device, one of the computer peripherals, is an input device that recognizes mouse movements on the two-dimensional plane of a monitor, and it is possible to use it conveniently or inputting and editing during the running of application programs. The existing password-based authentication methods are vulnerable to keyboard-data exposure, so a new authentication method that is based on the mouse input has emerged. Nevertheless, a security assessment of the mouse-based authentication method has not been practically analyzed; for this reason, the exposure of mouse data is evaluated in this paper based on the mouse loggers that can be easily obtained from Web sites. It will be possible to utilize the analyzed result to formulate a security guideline to prevent the exposure of authentication information that is based on the image-based authentication.
KeywordsCoordinate Position Authentication Method Mouse Data Screen Image Security Assessment
Unable to display preview. Download preview PDF.
- 1.Wikipedia, Computer_mouse, https://en.wikipedia.org/wiki/Computer_mouse
- 2.Kyungroul Lee, Youngtae Choi, Hyeungjun Yeuk, and Kangbin Yim, Password Sniff by Forcing the Keyboard to Replay Scan Codes, Proceedings of the JWIS (Joint Workshop on Information Security), pp.9, Aug. 2010.Google Scholar
- 3.Kyungroul Lee and Kangbin Yim, Keyboard Security: A Technological Review, Proceeding of the IMIS (Innovative Mobile and Internet Services in Ubiquitous Computing), pp.9-15, Jun. 2011.Google Scholar
- 4.Z Minchev, G Dukov, and S Georgiev, EEG spectral analysis in serious gaming: An ad hoc experimental application, BIO Automation, 13(4), pp.79-88, 2009.Google Scholar
- 5.LO4D.com, Mouse Recorder Pro 2, http://mouse-recorder-pro-2.en.lo4d.com
- 6.softonic, Axife Mouse Recorder, http://axife-mouse-recorder.en.softonic.com
- 7.Download.com, Automatic Mouse and Keyboard, http://download.cnet.com/Automatic-Mouse-and-Keyboard/3000-2084_4-75324350.html
- 8.Ghost Mouse, Ghost mouse, http://www.ghost-mouse.com