{"id":"https://openalex.org/W4402350002","doi":"https://doi.org/10.1145/3678570","title":"PuppetMouse: Practical and Contactless Mouse Manipulation Attack via Intentional Electromagnetic Interference Injection","display_name":"PuppetMouse: Practical and Contactless Mouse Manipulation Attack via Intentional Electromagnetic Interference Injection","publication_year":2024,"publication_date":"2024-08-22","ids":{"openalex":"https://openalex.org/W4402350002","doi":"https://doi.org/10.1145/3678570"},"language":"en","primary_location":{"id":"doi:10.1145/3678570","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3678570","pdf_url":null,"source":{"id":"https://openalex.org/S4210219751","display_name":"Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies","issn_l":"2474-9567","issn":["2474-9567"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053433166","display_name":"Wenfan Song","orcid":"https://orcid.org/0000-0003-1769-8540"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenfan Song","raw_affiliation_strings":["Zhejiang University, China"],"raw_orcid":"https://orcid.org/0000-0003-1769-8540","affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100425087","display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0001-9003-8667"},"institutions":[{"id":"https://openalex.org/I4400573310","display_name":"Hangzhou City University","ror":"https://ror.org/01wck0s05","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573310"]},{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN","MO"],"is_corresponding":false,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["Zhejiang University, China, and Hangzhou City University, China"],"raw_orcid":"https://orcid.org/0000-0001-9003-8667","affiliations":[{"raw_affiliation_string":"Zhejiang University, China, and Hangzhou City University, China","institution_ids":["https://openalex.org/I76130692","https://openalex.org/I6469544","https://openalex.org/I4400573310"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023885705","display_name":"Jinsong Han","orcid":"https://orcid.org/0000-0001-5064-1955"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinsong Han","raw_affiliation_strings":["Zhejiang University, China"],"raw_orcid":"https://orcid.org/0000-0001-5064-1955","affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053433166"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.0092,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.77895352,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"8","issue":"3","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.7396378517150879},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6969619393348694},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6390599012374878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5847436189651489},{"id":"https://openalex.org/keywords/electromagnetic-interference","display_name":"Electromagnetic interference","score":0.5733975768089294},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.543502688407898},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4359188675880432},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4232547879219055},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.41426581144332886},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41152629256248474},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3294709324836731},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3200170397758484},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16444191336631775},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.12059378623962402},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11812698841094971}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.7396378517150879},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6969619393348694},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6390599012374878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5847436189651489},{"id":"https://openalex.org/C184892835","wikidata":"https://www.wikidata.org/wiki/Q1474513","display_name":"Electromagnetic interference","level":2,"score":0.5733975768089294},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.543502688407898},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4359188675880432},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4232547879219055},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.41426581144332886},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41152629256248474},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3294709324836731},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3200170397758484},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16444191336631775},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.12059378623962402},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11812698841094971},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678570","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3678570","pdf_url":null,"source":{"id":"https://openalex.org/S4210219751","display_name":"Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies","issn_l":"2474-9567","issn":["2474-9567"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3122804093","display_name":null,"funder_award_id":"No. U21A20462 and 62372400","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W154669480","https://openalex.org/W185142374","https://openalex.org/W605870022","https://openalex.org/W1565704529","https://openalex.org/W1994277501","https://openalex.org/W2013934681","https://openalex.org/W2151370481","https://openalex.org/W2207618852","https://openalex.org/W2321399159","https://openalex.org/W2805972105","https://openalex.org/W2947213621","https://openalex.org/W3021104963","https://openalex.org/W3094477543","https://openalex.org/W3134499140","https://openalex.org/W3159716805","https://openalex.org/W3195028474","https://openalex.org/W4206816395","https://openalex.org/W4226110960","https://openalex.org/W4244251907","https://openalex.org/W4281896190","https://openalex.org/W4288057774","https://openalex.org/W4288086180","https://openalex.org/W4308409998","https://openalex.org/W4324007071","https://openalex.org/W4383221521","https://openalex.org/W4384024364","https://openalex.org/W4385080301","https://openalex.org/W4386245218","https://openalex.org/W4387298391","https://openalex.org/W4390738456","https://openalex.org/W6653959153"],"related_works":["https://openalex.org/W2515419187","https://openalex.org/W2077352188","https://openalex.org/W2507130582","https://openalex.org/W4399793156","https://openalex.org/W2009238965","https://openalex.org/W2373690040","https://openalex.org/W2042575648","https://openalex.org/W4283269414","https://openalex.org/W2347214338","https://openalex.org/W1968856480"],"abstract_inverted_index":{"Mouse":[0],"is":[1,27],"a":[2],"ubiquitous":[3],"input":[4],"tool":[5],"crucial":[6],"for":[7],"user-computer":[8],"interaction":[9],"in":[10,17,148],"modern":[11],"society.":[12],"However,":[13],"the":[14,18,25,30,48,69,78,84,110,125,143,149,166],"inherent":[15],"trust":[16],"mouse":[19,26,60],"may":[20],"pose":[21],"security":[22],"risks.":[23],"If":[24],"maliciously":[28],"manipulated,":[29],"connected":[31],"computer":[32],"could":[33],"be":[34],"secretly":[35],"controlled,":[36],"endangering":[37],"personal":[38],"privacy":[39],"and":[40,62,87,96,121,127,137,160],"property.":[41],"In":[42],"this":[43],"paper,":[44],"we":[45],"introduce":[46],"PuppetMouse,":[47],"first":[49],"intentional":[50],"electromagnetic":[51],"interference":[52],"(IEMI)":[53],"injection-based":[54],"attack":[55,119],"that":[56],"can":[57,75],"effectively":[58],"manipulate":[59],"clicks":[61],"movements":[63],"without":[64],"physical":[65],"contact.":[66],"By":[67],"adjusting":[68],"parameters":[70],"of":[71,113,129,146,158],"IEMI":[72],"signals,":[73],"PuppetMouse":[74,147],"precisely":[76],"control":[77],"click":[79],"side,":[80],"as":[81,83],"well":[82],"movement":[85],"direction":[86],"speed.":[88],"We":[89,152],"demonstrate":[90],"PuppetMouse's":[91],"effectiveness":[92],"on":[93,134],"14":[94],"wired":[95],"wireless":[97],"mice":[98],"from":[99],"popular":[100],"brands.":[101],"The":[102],"short":[103],"response":[104],"delay":[105],"(within":[106],"4":[107],"ms)":[108],"affirms":[109],"real-time":[111],"performance":[112],"PuppetMouse.":[114,130,170],"Robustness":[115],"analysis":[116],"across":[117],"different":[118],"distances":[120],"material":[122],"occlusions":[123],"validate":[124],"stability":[126],"reliability":[128],"Two":[131],"case":[132],"studies":[133],"firewall":[135],"disabling":[136],"malicious":[138],"WiFi":[139],"connection":[140],"further":[141],"prove":[142],"severe":[144],"threats":[145],"real":[150],"world.":[151],"also":[153],"propose":[154],"an":[155],"integrated":[156],"set":[157],"hardware":[159],"software-based":[161],"defensive":[162],"mechanisms":[163],"to":[164],"mitigate":[165],"risks":[167],"posed":[168],"by":[169]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
