Proceedings of the 5th International Conference on Information Systems Security and Privacy 2019
DOI: 10.5220/0007578505800587
|View full text |Cite
|
Sign up to set email alerts
|

SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Schiffman, et al demonstrated an SMM-based keylogger that intercepted USB events before they were delivered to the OS kernel [26]. SMMDecoy provides an example of an SMM-based USB or PS/2 keyboard injection attack [19].…”
Section: Known Vulnerabilities Testedmentioning
confidence: 99%
See 1 more Smart Citation
“…Schiffman, et al demonstrated an SMM-based keylogger that intercepted USB events before they were delivered to the OS kernel [26]. SMMDecoy provides an example of an SMM-based USB or PS/2 keyboard injection attack [19].…”
Section: Known Vulnerabilities Testedmentioning
confidence: 99%
“…SMMDecoy provides an example of an SMM-based USB or PS/2 keyboard injection attack that generates fake user authentication credentials [19]. If these credentials are later used, the inference is that the credentials were gathered by a keylogger on the system.…”
Section: Ps/2 Keyloggersmentioning
confidence: 99%