Abstract—Logitech made the following statement in 2009: “Since the displacements of a mouse would not give any useful information to a hacker, the mouse reports are not encrypted. ” In this paper, we prove the exact opposite is true- i.e., it is indeed possible to leak sensitive information such as passwords through the displacements of a Bluetooth mouse. Our results can be easily extended to other wireless mice using different radio links. We begin by presenting multiple ways to sniff unencrypted Bluetooth packets containing raw mouse movement data. We then show that such data may reveal text-based passwords entered by clicking on software keyboards. We propose two attacks, the prediction attack and replay attack, which can reconstruct the...
Abstract—Bluetooth has found widespread adoption in phones, wireless headsets, stethoscopes, glucose...
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The attack allo...
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Heal...
Raw mouse movement data can be sniffed via off-the-shelf tools. In this demo, we show that such data...
In the modern era of technology, devices have become smaller, more user friendly and most importantl...
Although many users are aware of the threats that mal-ware pose, users are unaware that malware can ...
With the change from the pre-internet era to online society, user authentication technology is requi...
Aim: A smart toy robot has its intellect with circuits on board. It has a built-in microprocessor, s...
Shoulder surfing attacks are an unfortunate consequence of entering passwords or PINs into computers...
Mobile sensing has become a new style of applications and most of the smart devices are equipped wit...
Bluetooth Classic (BT) remains the de facto connectivity technology in car stereo systems, wireless ...
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The attack allo...
Security systems help to protect machines or sensitive data from unauthorized users. The need for be...
Wearables that constantly collect various sensor data of their users increase the chances for infere...
Computer keyboards are often used to transmit confidential data such as passwords. Since they contai...
Abstract—Bluetooth has found widespread adoption in phones, wireless headsets, stethoscopes, glucose...
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The attack allo...
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Heal...
Raw mouse movement data can be sniffed via off-the-shelf tools. In this demo, we show that such data...
In the modern era of technology, devices have become smaller, more user friendly and most importantl...
Although many users are aware of the threats that mal-ware pose, users are unaware that malware can ...
With the change from the pre-internet era to online society, user authentication technology is requi...
Aim: A smart toy robot has its intellect with circuits on board. It has a built-in microprocessor, s...
Shoulder surfing attacks are an unfortunate consequence of entering passwords or PINs into computers...
Mobile sensing has become a new style of applications and most of the smart devices are equipped wit...
Bluetooth Classic (BT) remains the de facto connectivity technology in car stereo systems, wireless ...
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The attack allo...
Security systems help to protect machines or sensitive data from unauthorized users. The need for be...
Wearables that constantly collect various sensor data of their users increase the chances for infere...
Computer keyboards are often used to transmit confidential data such as passwords. Since they contai...
Abstract—Bluetooth has found widespread adoption in phones, wireless headsets, stethoscopes, glucose...
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The attack allo...
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Heal...