Academic literature on the topic 'Keylogger'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Keylogger.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Keylogger"
S. Li, L., Z. M. Fauzee, N. Zamin, N. Kamarudin, N. A.Sabri, and N. S.Nik Ab Aziz. "An Encrypted Log File Keylogger System for Parental Control." International Journal of Engineering & Technology 7, no. 2.28 (May 16, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.28.12910.
Full textSingh, Arjun, Pushpa Choudhary, Akhilesh kumar singh, and Dheerendra kumar tyagi. "Keylogger Detection and Prevention." Journal of Physics: Conference Series 2007, no. 1 (August 1, 2021): 012005. http://dx.doi.org/10.1088/1742-6596/2007/1/012005.
Full textYadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.
Full textGuryanov, Konstantin V. "THE PROJECT "GUNMAN": FIRST KEYLOGGER." Basis, no. 2 (2020): 79–91. http://dx.doi.org/10.51962/2587-8042_2020_8_79.
Full textK.S, Jayalekshmi. "Foiling Keylogger Attacks using Virtual Onscreen Keyboard." International Journal of Computer Sciences and Engineering 7, no. 2 (February 28, 2019): 635–39. http://dx.doi.org/10.26438/ijcse/v7i2.635639.
Full textAron, Jacob. "Touchscreen keylogger captures details from your taps." New Scientist 211, no. 2825 (August 2011): 21. http://dx.doi.org/10.1016/s0262-4079(11)61950-7.
Full textJose, Bonia, Elizabeth Biju, Farsana A A, and Rijo M P. "WIRELESS HARDWARE KEYLOGGER USING ARDUINO LEONARDO AND NODEMCU." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 513–16. http://dx.doi.org/10.33564/ijeast.2020.v05i01.091.
Full textBayzid, Md, Mohiuddin Shoikot, Jafrul Hossain, and Anisur Rahman. "Keylogger Detection using Memory Forensic and Network Monitoring." International Journal of Computer Applications 177, no. 11 (October 17, 2019): 17–21. http://dx.doi.org/10.5120/ijca2019919483.
Full textDwivedi, Aarushi, Krishna Chandra Tripathi, and M. L. Sharma. "Advanced Keylogger- A Stealthy Malware for Computer Monitoring." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (April 6, 2021): 137–40. http://dx.doi.org/10.33130/ajct.2021v07i01.028.
Full textVogelgesang, Stephanie, Stefan Hessel, and Frederik Möllers. "Hardware-Keylogger: Die Tastatur in der Hand des Feindes." Datenschutz und Datensicherheit - DuD 40, no. 11 (October 13, 2016): 729–34. http://dx.doi.org/10.1007/s11623-016-0692-9.
Full textDissertations / Theses on the topic "Keylogger"
Karlsson, Tobias, and Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.
Full textDetta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
Palm, Patrik. "Utvärdering av antivirusskydd mot genererade trojaner : Är de ett hot?" Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-46848.
Full textGaliano, Alessandro. "Impersonificazione e sicurezza su rete." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8949/.
Full textMallick, Saptarshi. "Physical Layer Detection of Hardware Keyloggers." DigitalCommons@USU, 2014. https://digitalcommons.usu.edu/etd/3962.
Full textPuerini, Sara. "Typing your mind away. Comparing keylogged tasks with the Task Segment Framework." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22899/.
Full textCorbelli, Sonia. "Reati informatici e sicurezza - come tutelarsi a livello tecnico e giuridico." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textHung, Chien-wei, and 洪健惟. "KKBB: Kernel Keylogger Bye-Bye." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/31036288763818979315.
Full text國立中央大學
資訊工程研究所
99
Keystroke logging is one of the most widespread threats used for password theft in the world. In this paper, rather than detecting existing malwares or creating a trusted tunnel in the kernel, we present both QTE and Broker methods to safely input passwords in web browsers according to different scenarios. To fit real circumstances, we assume users have limited privileges on the untrusted public computers and they don’t want their passwords being eavesdropped; therefore, a user-space solution is proposed firstly as QTE method. The QTE method utilizes a canvas to cue users whether their input will be remembered or ignored by our add-on, which provides a chance for users to obfuscate keyloggers by tapping keyboards haphazardly. Despite QTE method is immune to most kernel, hypervisor, hardware, and second-channel keyloggers, it may be ineffective if screen recording is taken by attackers. To eliminate password leakage, the Broker method uses a second device and a Broker server to safely transfer information for users. In contract with previous works, our design successfully separates username and password so that even the second devices and the Broker servers are compromised, users won’t lose their private data to attackers. Furthermore, both methods we proposed can be applied to all websites without their support or users’ settings beforehand.
HSUEH, YU-SHENG, and 薛宇盛. "The Design and Implementation of Anti Keylogger." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/61083912654011461790.
Full text東吳大學
資訊管理學系
98
Currently, major web-based services such as Facebook, Gmail, and e-Bay, verify users’ identities through logging into the username and password. Once there exists the keylogger in the logging computer, the risk of identity theft is very high. Many users will use the same pair of username and password to access different websites. If the username and password are stolen, the other Internet identities are also stolen. This thesis aims to propose and implement the anti keylogger mechanism using API Hooking techniques to detect the keylogger. The proposed mechanism can prevent the keylogger from keyboard logging, screen capturing and asterisk password removal.
Güven, Volkan. "Patterns of malware and digital attacks : A guideline for the security enthusiast." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16313.
Full textBooks on the topic "Keylogger"
Зайцев, О. В. Rootkits, SpyWare/Adware, Keyloggers & Backdoors: обнаружение и защита. Санкт-Петербург: БХВ-Петербург, 2006.
Find full textKraft, Peter B. Network Hacking: Professionelle Angriffs- und Verteidigungstechniken gegen Hacker und Datendiebe ; [Tools fu r Angriff und Verteidigung - vom Keylogger bis zum Rootkit ; Vorbeugung gegen Malware-Attacken aus dem Internet ; effektive Schutzmassnahmen fu r Privat- und Firmennetze]. 2nd ed. Poing: Franzis, 2010.
Find full textZaytsev, Oleg. Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization. A-List Publishing, 2006.
Find full textBook chapters on the topic "Keylogger"
Simms, Seth, Margot Maxwell, Sara Johnson, and Julian Rrushi. "Keylogger Detection Using a Decoy Keyboard." In Data and Applications Security and Privacy XXXI, 433–52. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61176-1_24.
Full textRoyo, Álvaro Arribas, Manuel Sánchez Rubio, Walter Fuertes, Mauro Callejas Cuervo, Carlos Andrés Estrada, and Theofilos Toulkeridis. "Malware Security Evasion Techniques: An Original Keylogger Implementation." In Advances in Intelligent Systems and Computing, 375–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72657-7_36.
Full textRahaman, Naziour, Salauddin Rubel, and Ahmed Al Marouf. "Keylogger Threat to the Android Mobile Banking Applications." In Computer Networks and Inventive Communication Technologies, 163–74. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3728-5_12.
Full textWazid, Mohammad, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, and Asit Tyagi. "Implementation and Embellishment of Prevention of Keylogger Spyware Attacks." In Communications in Computer and Information Science, 262–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40576-1_26.
Full textKozierkiewicz-Hetmańska, Adrianna, Aleksander Marciniak, and Marcin Pietranik. "User Authentication Through Keystroke Dynamics as the Protection Against Keylogger Attacks." In Computational Collective Intelligence, 345–55. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45243-2_32.
Full textSbai, Hugo, Michael Goldsmith, Samy Meftali, and Jassim Happa. "A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them." In Cyberspace Safety and Security, 18–32. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01689-0_2.
Full textTuscano, Ashley, and Thomas Shane Koshy. "Types of Keyloggers Technologies – Survey." In Lecture Notes in Electrical Engineering, 11–22. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7961-5_2.
Full textGerdes, Ryan M., and Saptarshi Mallick. "Physical-Layer Detection of Hardware Keyloggers." In Research in Attacks, Intrusions, and Defenses, 26–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26362-5_2.
Full textJiménez Aranda, Itzael, Eleazar Aguirre Anaya, Raúl Acosta Bermejo, and Ponciano Jorge Escamilla Ambrosio. "Possible Keyloggers Without Implementing a Keyboard in Android." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 104–12. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78816-6_8.
Full textOrtolani, Stefano, Cristiano Giuffrida, and Bruno Crispo. "Bait Your Hook: A Novel Detection Technique for Keyloggers." In Lecture Notes in Computer Science, 198–217. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15512-3_11.
Full textConference papers on the topic "Keylogger"
Ali, Tasabeeh O. M., Omer S. A. Awadelseed, and Abeer E. W. Eldewahi. "Random multiple layouts: Keylogger prevention technique." In 2016 Conference of Basic Sciences and Engineering Studies (SGCAC). IEEE, 2016. http://dx.doi.org/10.1109/sgcac.2016.7457997.
Full textGunalakshmii, S., and P. Ezhumalai. "Mobile keylogger detection using machine learning technique." In 2014 International Conference on Computer Communication & Systems (ICCCS). IEEE, 2014. http://dx.doi.org/10.1109/icccs.2014.7068167.
Full textWajahat, Ahsan, Azhar Imran, Jahanzaib Latif, Ahsan Nazir, and Anas Bilal. "A Novel Approach of Unprivileged Keylogger Detection." In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEE, 2019. http://dx.doi.org/10.1109/icomet.2019.8673404.
Full textHuseynov, Huseyn, Kenichi Kourai, Tarek Saadawi, and Obinna Igbe. "Virtual Machine Introspection for Anomaly-Based Keylogger Detection." In 2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR). IEEE, 2020. http://dx.doi.org/10.1109/hpsr48589.2020.9098980.
Full textWazid, Mohammad, Avita Katal, R. H. Goudar, D. P. Singh, Asit Tyagi, Robin Sharma, and Priyanka Bhakuni. "A framework for detection and prevention of novel keylogger spyware attacks." In 2013 7th International Conference on Intelligent Systems and Control (ISCO). IEEE, 2013. http://dx.doi.org/10.1109/isco.2013.6481194.
Full textCho, Junsung, Geumhwan Cho, and Hyoungshick Kim. "Keyboard or keylogger?: A security analysis of third-party keyboards on Android." In 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2015. http://dx.doi.org/10.1109/pst.2015.7232970.
Full textKuncoro, Adam Prayogo, and Bagus Adhi Kusuma. "Keylogger Is A Hacking Technique That Allows Threatening Information On Mobile Banking User." In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). IEEE, 2018. http://dx.doi.org/10.1109/icitisee.2018.8721028.
Full textNasution, Surya Michrandi, Yudha Purwanto, Agus Virgono, and Girindra Chandra Alam. "Integration of kleptoware as keyboard keylogger for input recorder using teensy USB development board." In 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA). IEEE, 2014. http://dx.doi.org/10.1109/tssa.2014.7065954.
Full textWidyasari, Permata Ayu. "Ethical Dilemma Decision Making Based on Personality: The Case of Installation of a Keylogger System." In 18th International Symposium on Management (INSYMA 2021). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/aebmr.k.210628.042.
Full textAhmadzadegan, M. Hossein, Ali-asghar Khorshidvand, and Mehrdad Pezeshki. "A method for securing username and password against the Keylogger software using the logistic map chaos function." In 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI). IEEE, 2015. http://dx.doi.org/10.1109/kbei.2015.7436194.
Full text