Keyboard acoustic emanations revisited
Proceedings of the 12th ACM conference on Computer and communications security
Bot Detection Based on Traffic Analysis
IPC '07 Proceedings of the The 2007 International Conference on Intelligent Pervasive Computing
Detecting Bots Based on Keylogging Activities
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Detecting Software Keyloggers with Dendritic Cell Algorithm
CMC '10 Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 01
Bait your hook: a novel detection technique for keyloggers
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Hi-index | 0.00 |
Security and privacy are key challenges for every computer user. While various security mechanisms, such as anti-virus, anti-spyware, updates and patches, are extensively applied, they cannot provide total security. Software keyloggers represent a fast-growing class of malware. Keylogging software records the user's typed keystrokes and saves them to a log file, and is therefore capable of logging sensitive information such as passwords, usernames, PINs and so on.^1 It can also record user activities such as online chat, capture screenshots, note URLs visited and more. Moreover, some keyloggers can upload the log file directly to attackers through remote connections.^2