{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T21:34:55Z","timestamp":1769549695040,"version":"3.49.0"},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T00:00:00Z","timestamp":1724284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China Grants","doi-asserted-by":"crossref","award":["No. U21A20462 and 62372400"],"award-info":[{"award-number":["No. U21A20462 and 62372400"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Postdoctoral Fellowship Program of CPSF Grants","award":["No. GZC20241488"],"award-info":[{"award-number":["No. GZC20241488"]}]},{"name":"``Pioneer' and ``Leading Goose' R\\&D Program of Zhejiang Grants","award":["No. 2023C01033"],"award-info":[{"award-number":["No. 2023C01033"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2024,8,22]]},"abstract":"<jats:p>Mouse is a ubiquitous input tool crucial for user-computer interaction in modern society. However, the inherent trust in the mouse may pose security risks. If the mouse is maliciously manipulated, the connected computer could be secretly controlled, endangering personal privacy and property. In this paper, we introduce PuppetMouse, the first intentional electromagnetic interference (IEMI) injection-based attack that can effectively manipulate mouse clicks and movements without physical contact. By adjusting the parameters of IEMI signals, PuppetMouse can precisely control the click side, as well as the movement direction and speed. We demonstrate PuppetMouse's effectiveness on 14 wired and wireless mice from popular brands. The short response delay (within 4 ms) affirms the real-time performance of PuppetMouse. Robustness analysis across different attack distances and material occlusions validate the stability and reliability of PuppetMouse. Two case studies on firewall disabling and malicious WiFi connection further prove the severe threats of PuppetMouse in the real world. We also propose an integrated set of hardware and software-based defensive mechanisms to mitigate the risks posed by PuppetMouse.<\/jats:p>","DOI":"10.1145\/3678570","type":"journal-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:36:21Z","timestamp":1725892581000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["PuppetMouse: Practical and Contactless Mouse Manipulation Attack via Intentional Electromagnetic Interference Injection"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1769-8540","authenticated-orcid":false,"given":"Wenfan","family":"Song","sequence":"first","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9003-8667","authenticated-orcid":false,"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China, and Hangzhou City University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5064-1955","authenticated-orcid":false,"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560668"},{"key":"e_1_2_2_2_1","unstructured":"GLOBAL CYBERSECURITY ALLIANCE. 2024. Industrial Automation and Control System Taxonomy. https:\/\/shorturl.at\/dgtKM."},{"key":"e_1_2_2_3_1","unstructured":"AmesWeb. 2024. DENSITY OF MATERIALS. https:\/\/amesweb.info\/Materials\/Density-Materials.aspx."},{"key":"e_1_2_2_4_1","unstructured":"Amplifier. 2024. 4W 10-1000MHz RF power amplifier broadband RF power amplifier. https:\/\/www.ebay.com.sg\/itm\/124945225075."},{"key":"e_1_2_2_5_1","volume-title":"433MHZ 35dBi SMA High Gain Antenna Sucker Head Copper Signal Wireless Data. https:\/\/shorturl.at\/twP29","unstructured":"Antenna. 2024. 433MHZ 35dBi SMA High Gain Antenna Sucker Head Copper Signal Wireless Data. https:\/\/shorturl.at\/twP29."},{"key":"e_1_2_2_6_1","volume-title":"The art of hardware architecture: Design methods and techniques for digital circuits","author":"Arora Mohit","unstructured":"Mohit Arora. 2011. The art of hardware architecture: Design methods and techniques for digital circuits. Springer Science & Business Media."},{"key":"e_1_2_2_7_1","unstructured":"USRP B210. 2024. USRP B210 SDR Kit - Dual Channel Transceiver (70 MHz - 6GHz). https:\/\/www.ettus.com\/all-products\/ub210-kit\/."},{"key":"e_1_2_2_8_1","unstructured":"Brian Benchoff. 2014. AREAL MALWARE IN A MOUSE. https:\/\/hackaday.com\/2014\/03\/31\/a-real-malware-in-a-mouse\/."},{"key":"e_1_2_2_9_1","unstructured":"Becky Bracken. 2023. Malware Uses Trigonometry to Track Mouse Strokes. https:\/\/www.darkreading.com\/application-security\/malware-uses-trigonometry-to-track-mouse-strokes."},{"key":"e_1_2_2_10_1","volume-title":"Template matching techniques in computer vision: theory and practice","author":"Brunelli Roberto","unstructured":"Roberto Brunelli. 2009. Template matching techniques in computer vision: theory and practice. John Wiley & Sons."},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/140984452"},{"key":"e_1_2_2_12_1","volume-title":"MEDICAL DEVICES: Guidance document. https:\/\/shorturl.at\/abyBR.","author":"EUROPEAN","year":"2016","unstructured":"EUROPEAN COMMISSION. 2016. MEDICAL DEVICES: Guidance document. https:\/\/shorturl.at\/abyBR."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00032"},{"key":"e_1_2_2_14_1","unstructured":"IBE Electronics. 2022. PCB Shielding-type material and purpose. https:\/\/www.pcbaaa.com\/pcb-shielding-type-material-and-purpose\/."},{"key":"e_1_2_2_15_1","unstructured":"Joe Elenjickal. 2022. What Is Clickjacking? How Can A Hacker Steal Your Mouse Clicks? https:\/\/prophaze.com\/web-application-firewall\/what-is-clickjacking\/."},{"key":"e_1_2_2_16_1","volume-title":"A guide to debouncing. Guide to Debouncing","author":"Ganssle Jack G","year":"2004","unstructured":"Jack G Ganssle. 2004. A guide to debouncing. Guide to Debouncing, Ganssle Group, Baltimore, MD, US (2004), 1--22."},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228859"},{"key":"e_1_2_2_18_1","unstructured":"Andy Greenberg. 2016. A Hacker Tried to Poison a Florida City's Water Supply Officials Say. https:\/\/www.wired.com\/story\/oldsmar-florida-water-utility-hack\/."},{"key":"e_1_2_2_19_1","unstructured":"Roger Grimes. 2011. Yes even a mouse can infect your network. https:\/\/www.csoonline.com\/article\/548716\/insider-threats-yes-even-a-mouse-can-infect-your-network.html."},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fmre.2022.05.015"},{"key":"e_1_2_2_21_1","unstructured":"National Instruments. 2022. LP0410 Log Periodic PCB Antenna. https:\/\/www.ettus.com\/all-products\/lp0410\/."},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24616"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2015.2463089"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/physics2020009"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497771"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.23919\/cje.2021.00.124"},{"key":"e_1_2_2_28_1","unstructured":"Matt Liebowitz. 2011. Hackers Use Rogue Mouse to Crack Firewall. https:\/\/www.nbcnews.com\/id\/wbna43568622."},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179364"},{"key":"e_1_2_2_30_1","unstructured":"magalsh64. 2023. Hack to turn a Logitech G402 Mouse into a Camera! https:\/\/github.com\/maglash64\/g402_camera."},{"key":"e_1_2_2_31_1","unstructured":"Microsoft. 2023. Understanding and configuring Windows Connection Manager. https:\/\/learn.microsoft.com\/en-us\/windows-hardware\/drivers\/mobilebroadband\/understanding-and-configuring-windows-connection-manager."},{"key":"e_1_2_2_32_1","unstructured":"Newsroom. 2023. New Financial Malware 'JanelaRAT' Targets Latin American Users. https:\/\/thehackernews.com\/2023\/08\/new-financial-malware-janelarat-targets.html."},{"key":"e_1_2_2_33_1","volume-title":"2020 35th International Technical Conference on Circuits\/Systems, Computers and Communications (ITC-CSCC). 348--353","author":"Ogura Hiroto","year":"2020","unstructured":"Hiroto Ogura, Ryunosuke Isshiki, Kengo Iokibe, Yuta Kodera, Takuya Kusaka, and Yasuyuki Nogami. 2020. Electrical Falsification of CAN Data by Magnetic Coupling. In 2020 35th International Technical Conference on Circuits\/Systems, Computers and Communications (ITC-CSCC). 348--353."},{"key":"e_1_2_2_34_1","volume-title":"20th Annual Network and Distributed System Security Symposium, NDSS 2013","author":"Pan Xian","year":"2013","unstructured":"Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, and Xinwen Fu. 2013. How Privacy Leaks From Bluetooth Mouse?. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2013\/how-privacy-leaks-bluetooth-mouse"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2413410"},{"key":"e_1_2_2_36_1","unstructured":"Electronic Products. 2011. Optical mouse technology: Here to stay still evolving. https:\/\/www.electronicproducts.com\/optical-mouse-technology-here-to-stay-still-evolving\/."},{"key":"e_1_2_2_37_1","unstructured":"Riverdi. 2020. Mitigating Electromagnetic Interference in Display Technologies Across Sectors: A Comprehensive Guide. https:\/\/riverdi.com\/blog\/mitigating-electromagnetic-interference-in-display-technologies-across-sectors."},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196556"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833718"},{"key":"e_1_2_2_40_1","unstructured":"Shreyas Sharma. 2024. Understanding PCB Thickness: A Comprehensive Guide. https:\/\/www.wevolver.com\/article\/pcbs-thickness-understanding-thickness-variations."},{"key":"e_1_2_2_41_1","volume-title":"Radiometry and the Friis transmission equation. American journal of physics 81, 1","author":"Shaw Joseph A","year":"2013","unstructured":"Joseph A Shaw. 2013. Radiometry and the Friis transmission equation. American journal of physics 81, 1 (2013), 33--37."},{"key":"e_1_2_2_42_1","unstructured":"Matt Sheimo. 2021. AHHH! MY MOUSE AND KEYBOARD WERE HACKED! https:\/\/www.sikich.com\/insight\/ahhh-my-mouse-and-keyboard-were-hacked\/."},{"key":"e_1_2_2_43_1","unstructured":"Kelly Sheridan. 2017. New Attack Method Delivers Malware Via Mouse Hover. https:\/\/www.darkreading.com\/endpoint-security\/new-attack-method-delivers-malware-via-mouse-hover."},{"key":"e_1_2_2_44_1","volume-title":"Input devices","author":"Sherr Sol","unstructured":"Sol Sherr. 2012. Input devices. Vol. 1. Elsevier."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_2_2_46_1","volume-title":"Fundamentals of computer vision","author":"Snyder Wesley E","unstructured":"Wesley E Snyder and Hairong Qi. 2017. Fundamentals of computer vision. Cambridge University Press."},{"key":"e_1_2_2_47_1","unstructured":"Empower RF System. 2022. High Power RF Amplifiers Systems and Modules. https:\/\/www.empowerrf.com\/products\/rf-power-amplifier.php."},{"key":"e_1_2_2_48_1","unstructured":"Mike Szczys. 2014. BADUSB MEANS WE'RE ALL SCREWED. https:\/\/hackaday.com\/2014\/10\/05\/badusb-means-were-all-screwed\/."},{"key":"e_1_2_2_49_1","volume-title":"Pressure sensors: selection and application","author":"Tandeske Duane","unstructured":"Duane Tandeske. 1990. Pressure sensors: selection and application. CRC Press."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139108967304"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354195"},{"key":"e_1_2_2_52_1","unstructured":"Vicon. 2024. WHAT IS ELECTROMAGNETIC COMPATIBILITY TESTING ? https:\/\/www.vicom.com.au\/page\/217\/emc-emi-testing-what-is-electromagnetic-compatibility-testing-."},{"key":"e_1_2_2_53_1","volume-title":"31st USENIX Security Symposium, USENIX Security 2022","author":"Wang Kai","year":"2022","unstructured":"Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, and Wenyuan Xu. 2022. GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. In 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, Kevin R. B. Butler and Kurt Thomas (Eds.). USENIX Association, 1543--1559. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/wang-kai"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3352593"},{"key":"e_1_2_2_55_1","unstructured":"wiki. 2024. Computer mouse. https:\/\/en.wikipedia.org\/wiki\/Computer_mouse."},{"key":"e_1_2_2_56_1","unstructured":"WiKi. 2024. Optical mouse. https:\/\/en.wikipedia.org\/wiki\/Optical_mouse."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607249"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23482"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2021.3058585"},{"key":"e_1_2_2_60_1","first-page":"666","article-title":"Force sensing resistors: A review of the technology","volume":"1991","author":"Yaniger SI","year":"1991","unstructured":"SI Yaniger. 1991. Force sensing resistors: A review of the technology. Electro International, 1991 (1991), 666--668.","journal-title":"Electro International"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545948.3545949"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3590326"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678570","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:43:01Z","timestamp":1755787381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678570"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,22]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,8,22]]}},"alternative-id":["10.1145\/3678570"],"URL":"https:\/\/doi.org\/10.1145\/3678570","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,22]]},"assertion":[{"value":"2024-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}