Mic-E-Mouse: Researchers Turn High-DPI Mice into Covert Microphones

Уязвимость Mic-E-Mouse: оптическая мышь может подслушивать разговоры через вибрации

Mic-E-Mouse: How a High-DPI Optical Mouse Can Be Turned into a Microphone​


Researchers at the University of California, Irvine have demonstrated a side-channel attack called “Mic-E-Mouse” that uses high-sensitivity optical mice to sense desk vibrations and reconstruct nearby speech with surprising accuracy.

Proof-of-concept: sensors, Wiener filters, and neural nets​

The Mic-E-Mouse technique extracts raw motion data from high-DPI optical sensors and applies a signal-processing pipeline — including Wiener filtering — followed by a neural network to recover intelligible audio from surface vibrations. In controlled tests with ~20,000 DPI sensors and high polling rates, the team showed measurable speech reconstruction from mouse sensor traces.

How effective is the attack in practice?​

Under optimal, quiet conditions the system achieved notable recognition accuracy for short utterances, with numeric strings (e.g., card digits) proving easier to recover than long conversational speech. Performance degrades in noisy rooms or when the mouse has poor mechanical coupling with the desk surface.

Two preconditions: a sensitive mouse and a compromised machine​

Mic-E-Mouse is not a remote “drive-by” exploit. It requires:
  • A high-sensitivity mouse capable of capturing tiny surface motions (high DPI and high polling).
  • Malicious code or tooling on the PC to read raw sensor data and exfiltrate it for processing.
This constraint limits immediate risk to targets where host compromise is plausible.

What types of data are most at risk?​

Digits and short phrases are comparatively easier to reconstruct than free-form speech. The pipeline can also detect discrete mechanical events; for example, certain keystrokes produce distinguishable vibration signatures, which could be combined with other side channels to increase confidence.

Mitigations and vendor response​

Practical defenses include:
  • Restricting access to raw sensor streams at the OS/driver level.
  • Reducing polling rates or applying on-device filtering.
  • Mechanically damping the mouse/desk interface (pads, softer surfaces).
  • Maintaining strong endpoint security to prevent code execution and data exfiltration.
Vendors have been notified and are evaluating mitigations.

How worried should ordinary users be?​

For typical consumers the near-term risk is low because multiple conditions must align. However, in sensitive environments — newsrooms, boardrooms, research labs — the findings expand the threat model beyond microphones and webcams to include common peripherals.

Bigger picture: side channels keep evolving​

Mic-E-Mouse joins a long line of creative side-channel research (laser listening, keyboard acoustics, power analysis). Small changes in drivers, sampling policies, and hardware design can substantially shrink this attack surface.

Conclusion​

Turning a ubiquitous desktop accessory into an “invisible ear” is a compelling proof-of-concept. While practical exploitation depends on strict prerequisites, the research should prompt both vendors and defenders to reassess how peripheral telemetry is exposed and controlled.


Editorial Team — CoinBotLab

Comments

There are no comments to display

Information

Author
Coinbotlab
Published
Views
116

More by Coinbotlab

Top