2010
DOI: 10.1007/978-3-642-15512-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Bait Your Hook: A Novel Detection Technique for Keyloggers

Abstract: Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unprivileged programs running in user space to eavesdrop and record all the keystrokes of the users of the system. Such an ability to run in unprivileged mode facilitates their implementation and distribution, but, at the same time, allows to understand and model their behavior in detail. Leveraging this property, we propose a new detection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 14 publications
0
15
0
Order By: Relevance
“…Second, we remind that the adopted correlation metric is known to be robust against attempts to break the correlation by disguisement. For example, in [13] we show that the PCC is not affected by keyloggers writing to a file a random number of bytes for each intercepted keystroke. Finally, a malicious application performing any DOS attack should also avoid introducing an excessive delay not to miss subsequent keystrokes.…”
Section: Discussionmentioning
confidence: 89%
See 4 more Smart Citations
“…Second, we remind that the adopted correlation metric is known to be robust against attempts to break the correlation by disguisement. For example, in [13] we show that the PCC is not affected by keyloggers writing to a file a random number of bytes for each intercepted keystroke. Finally, a malicious application performing any DOS attack should also avoid introducing an excessive delay not to miss subsequent keystrokes.…”
Section: Discussionmentioning
confidence: 89%
“…In order to generate a pattern representation from these input specifications we used the statistical suite R [15]. To obtain low predictability of the pattern in question, we leverage all the standard random distributions supported by R. Throughout our tests adopting different distributions and parameters yielded comparable accuracy results, as already confirmed in [13]. Upon completion of the injection, the detector receives a detailed report of the memory writes the process performed.…”
Section: Detectormentioning
confidence: 95%
See 3 more Smart Citations