Security Assessment on the Mouse Data using Mouse Loggers

  • Hyeji Lee
  • Yeunsu Lee
  • Kyungroul Lee
  • Kangbin YimEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)


The mouse device, one of the computer peripherals, is an input device that recognizes mouse movements on the two-dimensional plane of a monitor, and it is possible to use it conveniently or inputting and editing during the running of application programs. The existing password-based authentication methods are vulnerable to keyboard-data exposure, so a new authentication method that is based on the mouse input has emerged. Nevertheless, a security assessment of the mouse-based authentication method has not been practically analyzed; for this reason, the exposure of mouse data is evaluated in this paper based on the mouse loggers that can be easily obtained from Web sites. It will be possible to utilize the analyzed result to formulate a security guideline to prevent the exposure of authentication information that is based on the image-based authentication.


Coordinate Position Authentication Method Mouse Data Screen Image Security Assessment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    Kyungroul Lee, Youngtae Choi, Hyeungjun Yeuk, and Kangbin Yim, Password Sniff by Forcing the Keyboard to Replay Scan Codes, Proceedings of the JWIS (Joint Workshop on Information Security), pp.9, Aug. 2010.Google Scholar
  3. 3.
    Kyungroul Lee and Kangbin Yim, Keyboard Security: A Technological Review, Proceeding of the IMIS (Innovative Mobile and Internet Services in Ubiquitous Computing), pp.9-15, Jun. 2011.Google Scholar
  4. 4.
    Z Minchev, G Dukov, and S Georgiev, EEG spectral analysis in serious gaming: An ad hoc experimental application, BIO Automation, 13(4), pp.79-88, 2009.Google Scholar
  5. 5., Mouse Recorder Pro 2,
  6. 6.
    softonic, Axife Mouse Recorder,
  7. 7.
  8. 8.
    Ghost Mouse, Ghost mouse,

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Hyeji Lee
    • 1
  • Yeunsu Lee
    • 1
  • Kyungroul Lee
    • 2
  • Kangbin Yim
    • 1
    Email author
  1. 1.Dept. of Information Security EngineeringSoonchunhyang UniversityAsanSouth Korea
  2. 2.R&BD Center for Security and Safety Industries (SSI), Soonchunhyang UniversityAsanSouth Korea

Personalised recommendations