Anti keylogger techniques - Literature review Example

Comments (0) Cite this document
Key-logger is a furtive surveillance application, which records activities of computer users in a variety of ways like keyboard, mouse, screen, and voice logging, entirely in indiscernible mode. In the contemporary society, ‘key-loggers present serious challenges to security…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Anti keylogger techniques
Read TextPreview

Extract of sample "Anti keylogger techniques"

ANTI KEY-LOGGER TECHNIQUES ANTI KEY-LOGGER TECHNIQUES Key-logger is a furtive surveillance application, which records activities of computer users in a variety of ways like keyboard, mouse, screen, and voice logging, entirely in indiscernible mode. In the contemporary society, ‘key-loggers present serious challenges to security and privacy. This literature review presents an analysis of some contemporary techniques proposed to avert key-loggers.
Baig and Mahmood (2007) confirm that it is essential to address system security and privacy in a timely manner. Continuous updates of anti-virus applications and operating systems are necessary to augment the system security level. The recent increase in internet usage means that that the disadvantages of key-loggers outweigh its productive uses. The source amplifies how key-loggers are a serious threat to privacy and security, especially because they are barely discernible against anti-virus and spyware applications.
Transient kernel control flow attacks are an innovative group of stealthy kernel-level malware that apply dynamic soft timers to attain considerable work while evading any continual alterations to kernel code or data (Wei, Payne, Giffin, and Pu, 2008). To defend against attacks such as stealthy key logger and a CPU cycle stealer, it is essential to examine the static analysis of the entire kernel. The source affirms that through this, one can identify and catalog all genuine STIR in a database. At run-time, a reference monitor in a reliable virtual machine allows the implementation of recognized and good soft timer interrupt requests and averts implementation of all unidentified STIRs.
Schiffman and Kaplan (2014) present new SMM-based malware that usurps USB host controllers to interrupt USB events. System Management Mode (SMM) in x86 can manage physical hardware that the host operating system cannot notice virtually. It is a new class of malware with unbelievable power that helps to transform kernel data structures and trapping on I/O registers to execute PS/2 key loggers. In essence, it helps SMM root kits to manage USB devices straightforwardly without while denying the OS kernel from receiving USB-related hardware interrupts. Schiffman and Kaplan also discuss a proof-of-concept USB key logger, which are harder to identify than previous SMM-based key loggers that are activated by OS actions like port I/O. The source further suggests extra extensions to this technique and processes to avoid and moderate such attacks.
Gupta, Sengupta, Bhattacharyya, and Chattrejee (2009) present a user verification system for web applications using JME facilitated cellular phone as verification symbol. Masquerading is a common technique through which attackers steal critical information such as passwords from computers following the increased use of web based user verification systems. The reference recommends a user verification system that has a Computer Terminal and a JME enabled cellular phone with parallel network channel that can segment and cluster. In the end, an SMS from a mobile phone establishes the user.
In the contemporary society, the need for confidentiality and security for computer users is on the rise, especially with the recent threat of keyloggers. Sreenivas and Anitha (2011) highlight that security mechanisms, such as anti-spyware, anti-virus, and security updates do not offer total security for computer users. This reference is necessary because it explains the urgent need to develop anti key-logging software and techniques that avert threats to users.
List of References
BAIG, M. and MAHMOOD, W., 2007, “A Robust Technique of Anti Key-Logging using Key-Logging Mechanism”, IEEE, Digital Ecosystems and Technologies Conference, 2007. DEST 07. Inaugural IEEE-IES. DOI: 10.1109/DEST.2007.371990.
GUPTA, S., SENGUPTA, S., BHATTACHARYYA, M., and CHATTREJEE, S., 2009, “Cellular phone based web authentication system using 3-D encryption technique under stochastic framework” IEEE. DOI:10.1109/AHICI.2009.5340322.
SCHIFFMAN, J. and KAPLAN, D., 2014, “The SMM Rootkit Revisited: Fun with USB”, IEEE. DOI:10.1109/ARES.2014.44
SREENIVAS, S., and ANITHA, R., 2011, “Feature: Detecting keyloggers based on traffic analysis with periodic behavior”, Journal Network Security, Volume 2001, Issue 7. Pages 14-19. Elsevier Science Publishers. ACM Digital Library.
WEI, J., PAYNE, B., GIFFIN, J., and PU, C., 2008, “Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense”, IEEE, Computer Security Applications Conference, 2008. ACSAC 2008. Read More
Cite this document
  • APA
  • MLA
(“Anti keylogger techniques Literature review Example | Topics and Well Written Essays - 500 words”, n.d.)
Anti keylogger techniques Literature review Example | Topics and Well Written Essays - 500 words. Retrieved from
(Anti Keylogger Techniques Literature Review Example | Topics and Well Written Essays - 500 Words)
Anti Keylogger Techniques Literature Review Example | Topics and Well Written Essays - 500 Words.
“Anti Keylogger Techniques Literature Review Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Anti keylogger techniques


...? (Assignment) Anti-federalists The anti-federalists who opposed the ratification of US constitution (1987) includedfarmers, tradesmen and other individuals notably from non wealthy segments. Patrick Henry and George Mason constituted some of the prominent personalities of anti-federalist group. The local politicians who feared of losing their power also joined the anti-federalists. “The arguments of anti-federalists relied on rhetoric of revolutionary war era which stressed on virtues of local rule and associated centralized power with a tyrannical monarch” (Constitution of the United Status-Federalists versus ant-federalists). The strong belief of...
2 Pages(500 words)Essay

Keylogger scam. Computer crimes

...? Case Study Keylogger Scam Introduction Modern times of technology andvirtual networking have given birth to another level of fraudulent crimes being committed across the globe. Cyber crimes have caused losses of millions of dollars to citizens, corporations and government of the United States. Keylogger scam, as discussed in this paper, refers to hidden logging systems installed by hackers which track all activities of users, maintains logs of keys and passwords and gives constant monitoring capabilities. This paper entails the types of computer crimes existing in our society, technological safeguards available and examples of frauds that have practically occurred in past. Computer crimes Computer...
3 Pages(750 words)Book Report/Review

Anti Trust

...? ANTI-TRUST Introduction Health care organization is a type of managed unit that provides health care rendered by professionals and doctors in particular closed network in accordance with HCO’s guidelines. The HCOs reimburse the service provider networks by paying fixed remunerations for each patient. This shifts the risks and liabilities of the patient on the shoulders of the service providers. The objective of the thesis is to research a recent case related to a health care organization in United States that has been charged with anti-trust action. On the basis of this case and lessons learnt from analysis, the report advises and recommends the senior management on how it could avoid threat of Federal Trade Commission (FTC... )...
3 Pages(750 words)Essay

Anti forensic

...? Anti-Forensic Technologies There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it unrecoverable digital tracks of a crime in any form of magnetic media. Computer forensics department holds the mandate of collecting as much information and documentation about a crime as possible, regardless of whether such information is computer related or not. As such, computer forensics identifies the discipline involved in the study of the techniques and methodologies necessary...
10 Pages(2500 words)Essay


...In light of the concerns placed on the legality of UK interrogation procedures in relation to anti terrorism laws, "rule of law" Table of ContentChapter Page No. Introduction 02 Anti-Terrorism Provisions 03 The Forgotten Detainees 05 Creating Terrorist Suspects 06 Reflection 07 Conclusion 08 Bibliography 09 "Citizens should have statutory rights to enforce their human rights in the UK courts. We will by statute incorporate the European Convention on Human Rights into UK law to bring these rights home and allow our people access to them in their national courts. The incorporation of the European Convention will...
7 Pages(1750 words)Essay

Anti-immigration and anti-bilingual education

...Anti-immigration and anti-bilingual education Answer: Discriminatory policies and politics at present are common in different forms. Most of the times it is already obvious as it has become part of the system whether in education alone or in government. The most common discriminatory process or system that is already planted in the environment of education is the use of English in many schools. Considering an English-speaking student in a school is now becoming a-must not just in international schools but also in some public schools. An example of this is the Philippines where progress and education is seen in how often a child can speak English and how good he is with the said language. The worst scenario that may be derived...
4 Pages(1000 words)Essay


...Anti-Globalization A Summary Globalization, a word tossed around like paltry change, has been the of furious debates and much-contestedarticles. Globalization-are you for it or against it Many a pitchfork has been raised (and many an eyebrow) about this oversimplified, but actually quite complicated term. And with the variety of opinions available on the topic, does the world really need yet another book on globalization Jagdish Bhagwati opens his book, In Defense of Globalization, with this query and quite succinctly, the answer is yes. There is always room for one more voice to be heard in this increasingly globalized world. The popular verdict on globalization has been one of a malevolent evil. In fact, it has...
5 Pages(1250 words)Essay

Keylogger Scam

...RUNNING HEAD: KEYLOGGER SCAM Keylogger Scam of the of the Keylogger Scam Crime has always been a significant killer in the societies. In the current society, technology has made crimes easier and more organized through the Internet. It can easily operate in the anonymity of cyberspace, and can be successful in that way. There are several web mobs such as the Stealth Division and Shadowcrew that are establishing networks to assist the phishes and crackers, fences and money launderers transfer many billions and even trillions of dollars, which are transacted and passed over the web portal every day (Baselinemag, 2005). A kelogger pertains to hardware, a computer program, or a physical...
3 Pages(750 words)Essay

Anti bullying

...are physically strong, have unique capabilities, or come from a financially well-off background, tend to look down upon others whom they perceive as weak targets (78-82). In addition, cases of bullying also exists within the workplace, where in most cases those who are in senior positions tend to show tendency of bullying toward those who are in junior positions. Bullying within schools and at workplaces is termed as peer abuse. This present informative essay is divided into a three part series that begins with the causes of bullying, the effects of bullying, and anti-bullying practices that should be implemented largely in schools. Causes of bullying In the studies conducted by Lemus, he stated that bullying is caused...
5 Pages(1250 words)Essay


...Anti-realism Anti-realism and realism are the two sides of a philosophical discussion behind the entire foundation of acknowledged scientific fact. These two philosophical discussions have opposing opinions on how different annotations generated in science are practical to the world. Whereas they are related to science, the broader discussion involves numerous areas inclusive of politics, religion and daily life. In science, the discussion is very significant suggestion, inquisitive of the margin between applied and theoretical science. Realism is based on the approval that non-observable theories happen. For instance, no one has ever seen black holes including the scientists, but phenomena predict that...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Literature review on topic Anti keylogger techniques for FREE!

Contact Us