Acoustic Side-Channel Attacks on a Computer Mouse

Conference Paper (2024)
Author(s)

Mauro Conti (TU Delft - Cyber Security, Università degli Studi di Padova)

Marin Duroyon (Student TU Delft)

Gabriele Orazi (Università degli Studi di Padova, FDM Business Services)

Gene Tsudik (University of California)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.1007/978-3-031-64171-8_3
More Info
expand_more
Publication Year
2024
Language
English
Research Group
Cyber Security
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. @en
Pages (from-to)
44-63
ISBN (print)
9783031641701
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Acoustic Side-Channel Attacks (ASCAs) extract sensitive information by using audio emitted from a computing devices and their peripherals. Attacks targeting keyboards are popular and have been explored in the literature. However, similar attacks targeting other human-interface peripherals, such as computer mice, are under-explored. To this end, this paper considers security leakage via acoustic signals emanating from normal mouse usage. We first confirm feasibility of such attacks by showing a proof-of-concept attack that classifies four mouse movements with 97% accuracy in a controlled environment. We then evolve the attack towards discerning twelve unique mouse movements using a smartphone to record the experiment. Using Machine Learning (ML) techniques, the model is trained on an experiment with six participants to be generalizable and discern among twelve movements with 94% accuracy. In addition, we experiment with an attack that detects a user action of closing a full-screen window on a laptop. Achieving an accuracy of 91%, this experiment highlights exploiting audio leakage from computer mouse movements in a realistic scenario.

Files

978-3-031-64171-8_3.pdf
(pdf | 4.81 Mb)
- Embargo expired in 13-01-2025
License info not available