2012 IEEE Symposium on Security and Privacy Workshops 2012
DOI: 10.1109/spw.2012.22
|View full text |Cite
|
Sign up to set email alerts
|

Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

Abstract: Kernel-level keyloggers, which are installed as part of the operating system (OS) with complete control of kernel code, data and resources, are a growing and very serious threat to the security of current systems. Defending against this type of malware means defending the kernel itself against compromise and it is still an open and difficult problem. This paper details the implementation of two classical kernel-level keyloggers for Linux 2.6.38 and how current defense approaches still fail to protect OSes agai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…The negatives include the need for real-time DOS attack detection as well as the need to examine the effects of changing K-value and DCA lifespan on performance. Navarro et al [12] discussed kernel-level keyloggers. Keyloggers that operate at the kernel level represent an imminent threat to the security of current systems.…”
Section: Literature Surveymentioning
confidence: 99%
“…The negatives include the need for real-time DOS attack detection as well as the need to examine the effects of changing K-value and DCA lifespan on performance. Navarro et al [12] discussed kernel-level keyloggers. Keyloggers that operate at the kernel level represent an imminent threat to the security of current systems.…”
Section: Literature Surveymentioning
confidence: 99%
“…Figure 1 depicts how the the keylogger is installing a Keyboard Filter Driver before the system's keyboard device driver takes effect [12]. In order to install this filter driver administrator privileges are required [17]. In the following, this filter driver captures keystrokes of the user and relays them by cloning.…”
Section: General Processing Of Keystrokesmentioning
confidence: 99%
“…Afterwards, the moveWindow_thread will be paused 16 . Now the keylogger window moves to a different position in the vicinity of the mouse pointer 17 . After a short waiting time, the pressed mouse button state will be imitated 18 .…”
Section: General Approachmentioning
confidence: 99%
See 1 more Smart Citation