Keystroke Logger

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 15 Experts worldwide ranked by ideXlab platform

Roy Ragsdale - One of the best experts on this subject based on the ideXlab platform.

  • undetectable monitoring in a fully virtualized environment a continuation of the hal Keystroke Logger
    Hawaii International Conference on System Sciences, 2009
    Co-Authors: Michael Kranch, Roy Ragsdale
    Abstract:

    Virtualization is ever an expanding research field and, as many predict, the way of the future for large scale business and server solutions. Originally designed as a method of centralizing physical resources and maintenance, recent research has developed methods of also utilizing virtualization for centralizing machine monitoring. Recently, there have been substantial advances in centralized monitoring in a virtualized environment[1]. Specifically, researchers at the Georgia Tech have developed XenAccess, a system for monitoring memory in a paravirtualized environment [2]. This paper highlights the differences between two popular virtualization methods, paravirtualization and full-system virtualization. A comparison between techniques used by XenAccess to those implemented in our undetectable Hardware

Michael Kranch - One of the best experts on this subject based on the ideXlab platform.

  • undetectable monitoring in a fully virtualized environment a continuation of the hal Keystroke Logger
    Hawaii International Conference on System Sciences, 2009
    Co-Authors: Michael Kranch, Roy Ragsdale
    Abstract:

    Virtualization is ever an expanding research field and, as many predict, the way of the future for large scale business and server solutions. Originally designed as a method of centralizing physical resources and maintenance, recent research has developed methods of also utilizing virtualization for centralizing machine monitoring. Recently, there have been substantial advances in centralized monitoring in a virtualized environment[1]. Specifically, researchers at the Georgia Tech have developed XenAccess, a system for monitoring memory in a paravirtualized environment [2]. This paper highlights the differences between two popular virtualization methods, paravirtualization and full-system virtualization. A comparison between techniques used by XenAccess to those implemented in our undetectable Hardware

Agus Hermawan - One of the best experts on this subject based on the ideXlab platform.

  • aplikasi virtual keyboard sebagai pengalih Keystroke Logger
    2012
    Co-Authors: Agus Hermawan
    Abstract:

    Rasa aman dalam menggunakan perangkat komputer dan jaringan lokal atau pun jaringan internet sangat dibutuhkan bagi pengguna. Banyaknya perangkat lunak mata-mata (spy software) membuat pencurian data atau informasi menjadi sangat mudah terjadi, salah satunya adalah perangkat lunak keyLogger. Perangkat lunak keyLogger memiliki fungsi utama untuk mencatat setiap penekanan tombol keyboard, fungsi ini biasa disebut dengan Keystroke Logger. Jika user menggunakan perangkat komputer yang telah terpasang perangkat lunak keyLogger maka seluruh aktifitas keyboard hardware saat digunakan akan tersimpan dan dapat dicuri oleh orang lain. Oleh karena itu dibutuhkan sebuah perangkat lunak sebagai pengalih pencatatan aktifitas keyboard oleh perangkat lunak mata-mata. Penelitian ini telah dapat membangun atau menciptakan perangkat lunak virtual keyboard. Virtual keyboard ini akan mensimulasikan penekanan tombol keyboard yang tidak sesuai dengan input sebenarnya. Perangkat lunak virtual keyboard ini dibangun dengan menggunakan metodologi pengembangan sistem sekuensial linier dan bahasa pemrograman Delphi sebagai code editor. Perangkat lunak virtual keyboard memudahkan user yang sering melakukan input informasi penting melalui perantara keyboard dengan perangkat komputer atau pun jaringan internet, seperti login dalam berbagai website, melakukan transaksi online dan lain-lain. Perangkat lunak virtual keyboard dapat memberikan rasa aman bagi penggunanya saat melakukan input informasi penting saat menggunakan perangkat komputer.

Masakatsu Nishigaki - One of the best experts on this subject based on the ideXlab platform.

  • a Keystroke Logger detection using keyboard input related api monitoring
    Network-Based Information Systems, 2011
    Co-Authors: Kohei Nasaka, Tomohiro Takami, Takumi Yamamoto, Masakatsu Nishigaki
    Abstract:

    Recently, Keystroke Logger is becoming a major security issue. Keystroke Logger is a malware that steels user's keyboard input without his or her informed consent. Keyboard input related Application Programming Interfaces (APIs) are commonly used by Keystroke Logger software to illegally record users' Keystrokes. This paper proposes a security scheme to protect against Keystroke Loggers by using a DLL to detect illegal use of APIs. By executing a program with the DLL, we can check whether the program includes any of these keyboard-input-related APIs or not.

Kohei Nasaka - One of the best experts on this subject based on the ideXlab platform.

  • a Keystroke Logger detection using keyboard input related api monitoring
    Network-Based Information Systems, 2011
    Co-Authors: Kohei Nasaka, Tomohiro Takami, Takumi Yamamoto, Masakatsu Nishigaki
    Abstract:

    Recently, Keystroke Logger is becoming a major security issue. Keystroke Logger is a malware that steels user's keyboard input without his or her informed consent. Keyboard input related Application Programming Interfaces (APIs) are commonly used by Keystroke Logger software to illegally record users' Keystrokes. This paper proposes a security scheme to protect against Keystroke Loggers by using a DLL to detect illegal use of APIs. By executing a program with the DLL, we can check whether the program includes any of these keyboard-input-related APIs or not.