Physical-Layer Detection of Hardware Keyloggers

نویسندگان

  • Ryan M. Gerdes
  • Saptarshi Mallick
چکیده

Physical Layer Detection of Hardware Keyloggers

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Keylogger Detection

..........................................................................................................................4 Introduction .....................................................................................................................4 Hardware Keyloggers Overview ..........................................................................................4 Products Tested........

متن کامل

An Online Approach for Kernel-level Keylogger Detection and Defense

Keyloggers have been studied for many years, but they still pose a severe threat to information security. Keyloggers can record highly sensitive information, and then transfer it to remote attackers. Previous solutions suffer from limitations in that: 1) Most methods focus on user-level keylogger detection; 2) Some methods need to modify OS kernels; 3) Most methods can be bypassed when the OS k...

متن کامل

Detecting Kernel Level Keyloggers Through Dynamic Taint Analysis

Keyloggers as invisible keystroke recorders have posed a serious threat to user privacy and security. It is difficult to detect keyloggers, especially kernel keyloggers that operate at the operating system’s kernel level, because of their inconspicuous activities and flexible interception methods. In this paper, we propose a framework using a dynamic taint analysis technique to detect kernel le...

متن کامل

Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy

Evasive software keyloggers hide their malicious behaviors to defeat run-time detection. In this paper, based on the analysis of the evasion mechanisms used by common software keyloggers, we established a framework for their detection. Using an enticement strategy, the framework we built could induce keyloggers exhibited more obvious malicious activities by mimicking user keystrokes. These ‘amp...

متن کامل

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015