2018
DOI: 10.1007/978-3-319-93563-8_20
|View full text |Cite
|
Sign up to set email alerts
|

A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…However, the attacker does not distinguish which data are real mouse data and which are fake, and as a result, the defense program effectively prevents the mouse data from being exposed. The process of this defense technique is shown in Figure 4 [9], and an example implementation result is shown in Figure 5 [9].…”
Section: Technique For Protecting Mouse Data Using the Wm_input Messagementioning
confidence: 99%
See 1 more Smart Citation
“…However, the attacker does not distinguish which data are real mouse data and which are fake, and as a result, the defense program effectively prevents the mouse data from being exposed. The process of this defense technique is shown in Figure 4 [9], and an example implementation result is shown in Figure 5 [9].…”
Section: Technique For Protecting Mouse Data Using the Wm_input Messagementioning
confidence: 99%
“…Despite these efforts, attack techniques have emerged that steal mouse data input from mouse devices via the GetCursorPos() function or the WM_INPUT message [6][7][8]. To prevent exposure mouse data from being compromised by mouse data attack techniques, mouse data defense techniques have emerged using the SetCursorPos() function or the WM_INPUT message [9]. These techniques effectively protect mouse data by preventing attackers from classifying real mouse data and fake mouse data by interfering with the generation of fake mouse data by defenders.…”
Section: Introductionmentioning
confidence: 99%
“…To counteract this vulnerability, a defense technique that can prevent the mouse position exposure has been studied. 17 This technique is the disturbance of the attacker by the random generation of arbitrary coordinates, but it does not prevent the extraction of the mouse position so the attacker cannot know the correct coordinates. Accordingly, it is possible to protect against the attack without exposing the mouse position.…”
Section: Existing Defense Techniques Of the Mouse Data Exposurementioning
confidence: 99%
“…This attack exploits a vulnerability that can be obtained using the screen x and y coordinates in the calling of the GetCursorPos() function. To counteract this vulnerability, a defense technique that can prevent the mouse position exposure has been studied . This technique is the disturbance of the attacker by the random generation of arbitrary coordinates, but it does not prevent the extraction of the mouse position so the attacker cannot know the correct coordinates.…”
Section: Related Workmentioning
confidence: 99%
“…In order to cope with the mouse attack technique, a mouse data protection technique that uses the SetCursorPos() function that prevents an attacker from tracking the mouse movement has emerged [11]. The key idea of this defense technique is not to expose the actual location input from the user, but to expose the mouse location information.…”
Section: Introductionmentioning
confidence: 99%