Hardware Keylogger Detection
نویسنده
چکیده
..........................................................................................................................4 Introduction .....................................................................................................................4 Hardware Keyloggers Overview ..........................................................................................4 Products Tested................................................................................................................4 How Does a PC Keyboard Work? .........................................................................................5 The Low Level Keyboard Command Set ...............................................................................5 How do Hardware Keyloggers Work? ...................................................................................8 DIY Keylogger Parts list .....................................................................................................9 Hardware Keylogger Detection .........................................................................................10 Command Responses Timing Issues? ................................................................................10 Emulating Keypresses .....................................................................................................10 The Authentication Mechanism and Menu System ...............................................................11 Default Passwords...........................................................................................................11 Changing the Keylogger Password ....................................................................................11 Hardware-based Password Reset Solutions ........................................................................12 Memory Limitations.........................................................................................................12 Keylogger Detection using Voltage or Current Measurement.................................................13 Keyboard Current Measurement .......................................................................................13 PC Voltage Measurement .................................................................................................14 References.....................................................................................................................16
منابع مشابه
Physical-Layer Detection of Hardware Keyloggers
Physical Layer Detection of Hardware Keyloggers
متن کاملAn Online Approach for Kernel-level Keylogger Detection and Defense
Keyloggers have been studied for many years, but they still pose a severe threat to information security. Keyloggers can record highly sensitive information, and then transfer it to remote attackers. Previous solutions suffer from limitations in that: 1) Most methods focus on user-level keylogger detection; 2) Some methods need to modify OS kernels; 3) Most methods can be bypassed when the OS k...
متن کاملDetection and Prevention of Keylogger Spyware Attack
A Keylogger is also known as keystroke logger. It is a software or hardware device which monitors each and every key typed by user on user keyboard. User can not identify the presence of keylogger on user computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their children’s or company owner to spy on their empl...
متن کاملYou Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger
Keyloggers are a prominent class of malware that harvests sensitive data by recording any typed in information. Keylogger implementations strive to hide their presence using rootkit-like techniques to evade detection by antivirus and other system protections. In this paper, we present a new approach for implementing a stealthy keylogger: we explore the possibility of leveraging the graphics car...
متن کاملYou Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger
Keyloggers are a prominent class of malware that harvests sensitive data by recording any typed in information. Keylogger implementations strive to hide their presence using rootkit-like techniques to evade detection by antivirus and other system protections. In this paper, we present a new approach for implementing a stealthy keylogger: we explore the possibility of leveraging the graphics car...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005