Hardware Keylogger Detection

نویسنده

  • Andy Davis
چکیده

..........................................................................................................................4 Introduction .....................................................................................................................4 Hardware Keyloggers Overview ..........................................................................................4 Products Tested................................................................................................................4 How Does a PC Keyboard Work? .........................................................................................5 The Low Level Keyboard Command Set ...............................................................................5 How do Hardware Keyloggers Work? ...................................................................................8 DIY Keylogger Parts list .....................................................................................................9 Hardware Keylogger Detection .........................................................................................10 Command Responses Timing Issues? ................................................................................10 Emulating Keypresses .....................................................................................................10 The Authentication Mechanism and Menu System ...............................................................11 Default Passwords...........................................................................................................11 Changing the Keylogger Password ....................................................................................11 Hardware-based Password Reset Solutions ........................................................................12 Memory Limitations.........................................................................................................12 Keylogger Detection using Voltage or Current Measurement.................................................13 Keyboard Current Measurement .......................................................................................13 PC Voltage Measurement .................................................................................................14 References.....................................................................................................................16

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Physical-Layer Detection of Hardware Keyloggers

Physical Layer Detection of Hardware Keyloggers

متن کامل

An Online Approach for Kernel-level Keylogger Detection and Defense

Keyloggers have been studied for many years, but they still pose a severe threat to information security. Keyloggers can record highly sensitive information, and then transfer it to remote attackers. Previous solutions suffer from limitations in that: 1) Most methods focus on user-level keylogger detection; 2) Some methods need to modify OS kernels; 3) Most methods can be bypassed when the OS k...

متن کامل

Detection and Prevention of Keylogger Spyware Attack

A Keylogger is also known as keystroke logger. It is a software or hardware device which monitors each and every key typed by user on user keyboard. User can not identify the presence of keylogger on user computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their children’s or company owner to spy on their empl...

متن کامل

You Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger

Keyloggers are a prominent class of malware that harvests sensitive data by recording any typed in information. Keylogger implementations strive to hide their presence using rootkit-like techniques to evade detection by antivirus and other system protections. In this paper, we present a new approach for implementing a stealthy keylogger: we explore the possibility of leveraging the graphics car...

متن کامل

You Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger

Keyloggers are a prominent class of malware that harvests sensitive data by recording any typed in information. Keylogger implementations strive to hide their presence using rootkit-like techniques to evade detection by antivirus and other system protections. In this paper, we present a new approach for implementing a stealthy keylogger: we explore the possibility of leveraging the graphics car...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005