Computer Science ›› 2013, Vol. 40 ›› Issue (10): 10-17.

Previous Articles     Next Articles

Research of Keyboard Input Security

LI Peng-wei,FU Jian-ming,SHA Le-tian and DING Shuang   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Keylogger is one of the most serious threats to the Internet users.In order to protect sensitive information input,the study summarized the threats along the process of information inputting using a keyboard and corresponding preventive measures.These threats work at different levels(physical/ring 0/ring 3)and use different attack approach(Query/Hook/Bypass).We summarized the threats faced by soft keyboard such as peep,screenshots,or information intercepted.We also proposed new attacks based on mouse behavior record,element analysis and measures to defense these attacks.We then tested the performance of security measures which are employed by existing research and applications.At last,the existing research in behavior-based keyloggers detection was summarized.

Key words: Keylogger,Sensitive information input,Keyboard,Virtual keyboard

[1] Chahrvin S,Line S.Keyloggers-your security nightmare?[J].Computer Fraud & Security,2007(7):10-11
[2] Holz T.Markus Engelberth Felix Freiling,Learning More About the Underground Economy:A Case-Study of Keyloggers and Dropzones[C]∥Computer Security-ESORICS.2009
[3] Chang H.The study on end-to-end security for ubiquitous commerce[J].Supercomput,2011,55:228-245
[4] Yamamoto H,Hayasaki Y,Nishida N.Securing information dis-play by use of visual cryptography[J].Optics Letters,September 1,2003,28(17):1564-1566
[5] Hung C-W ,Hsu F-H,Chen S-J,et al.QTE-based Solution to Keylogger Attacks[C]∥SECURWARE 2012:The Sixth International Conference on Emerging Security Information,Systems and Technologies.2012
[6] Balzarotti D,Cova M,Vigna G.ClearShot:Eavesdropping onKeyboard Input from Video[C]∥IEEE Symposium on Security and Privacy.2008
[7] 付永庆,郑莉,邵学辉.一种监听键盘录入信息的新方法[J].哈尔滨工程大学学报,2008,29(2)
[8] Sagiroglu S.Keyloggers[J].IEEE Technology and Society Ma-gazine,2009,28(3):10-17
[9] Daniel G.keyboard encryption[J].IEEE,2002,21(3):40-42
[10] Ortolani S,Giurida C,Crispo B.Bait Your Hook:A Novel Detection Technique for Keyloggers[C]∥RAID 2010.LNCS 6307,2010:198-217
[11] Fu Jun,Liang Yi-wen,Tan Cheng-yu,et al.Detecting Software Keyloggers with Dendritic Cell Algorithm[C]∥2010International Conference on Communications and Mobile Computing.2010
[12] Yin Heng,Poosankam P,Hanna S,et al.HookScout:Proactive Binary-Centric Hook Detection[J].DIMVA 2010.LNCS 6201,2010:1-20
[13] Sreenivas R S,Anitha D R.Detecting keyloggers based on traffic analysis with periodic behavior[J].Network Security,2011,2011(7):14-19
[14] Yim K.A new noise mingling approach to protect the authentication password[C]∥2010International Conference on Complex,Intelligent and Software Intensive Systems.2010
[15] Herley C,Florencio D.Microsoft Research,Redmond.HowTo Login From an Internet Cafe Without Worrying About Keyloggers[C]∥Symposium on Usable Privacy and Security(SOUPS)’06
[16] Li Chun-xiao,Raghunathan A,Jha N K.A Secure User Interface for Web Applications Running Under an Untrusted Operating System[C]∥201010th IEEE International Conference on Computer and Information Technology(CIT 2010)
[17] Mannan M,van Oorschot P C.Using a Personal Device toStrengthen Password Authentication from an Untrusted Computer[C]∥Proceedings of the 11th International Conference on Financial Cryptography and Data Security.2007:88-103
[18] Mihajlov M,Jerman-Blazˇic B.On designing usable and secure recognition-based graphical authentication mechanisms[J].Interacting with Computers,2011,23:582-593
[19] Raguram R,White A M,Goswami D.Fabian Monrose and Jan-Michael Frahm iSpy:Automatic Reconstruction of Typed Input fromCompromising Refiections[C]∥CCS’11.Chicago,Illinois,USA,October 2011
[20] Lim J.Defeat Spyware With Anti-Screen Capture Technology Using Visual Persistence[C]∥Symposium On Usable Privacy and Security(SOUPS).2007
[21] Gong Shang-fu,Lin Jun,Sun Yi-zhen.Design and Implementation of Anti-Screenshot Virtual Keyboard Applied in Online Banking[C]∥E-Business and E-Government(ICEE).2010:1320-1322
[22] Agarwal M,Mehra M,Pawar R,et al.Secure Authentication using Dynamic Virtual Keyboard Layout[C]∥International Conference and Workshop on Emerging Trends in Technology(ICWET 2011).TCET,Mumbai,India,2011
[23] Mohanty D.Defeating Virtual Keyboard Protection[C]∥Coffee and Security(C&S)2006
[24] Dorrendorf L,Gutterman Z.Cryptanalysis of the Random Number Generator of the Windows Operating System[J].ACM Transactions on Information and System Security,Publication date,2009,13(1)
[25] Krishnamurthy,Hema.Method and system for a secure virtual keyboard[P].United States Patent 8176324
[26] Heron S,Director M,Box N.The rise and rise of the keyloggers[J].Network Security,2007(6):4-6
[27] 魏东,车文刚,段继磊,等.利用日志钩子函数实现windows 系统信息的捕获[J].昆明理工大学学报:理工版,2002(4)
[28] 高志新,应力.访问键盘芯片获取PS/2键盘按键信息[J].信息安全与通信保密,2011(6)
[29] 王海晨,施勇,薛质.基于Windows平台的安全密码框研究与实现[J].信息安全与通信保密,2011(4)
[30] Vishnani K,Pais A R,Mohandas R.An In-Depth Analysis of the Epitome of Online Stealth:Keyloggers;and Their Countermeasures[C]∥ACC 2011,Part III.CCIS 192,2011:10-19
[31] MSDN.About Row Input.http://msdn.microsoft.com/en-us/library/windows/desktop/ms645543%28v=vs.85%29.aspx
[32] Nasaka K,Takami T,Yamamoto T.A keystroke logger detection using keyboard-input-related API monitoring[C]∥2011International Conference on Network-Based Information Systems
[33] 谭文,杨潇,邵坚磊.寒江独钓——Windows内核安全编程[M].北京:电子工业出版社,2009:57-97
[34] Lee K,Kim W,Bae K,et al.A Solution to Protecting USB Keyboard Data[C]∥2010International Conference on Broadband,Wireless Computing,Communication and Applications
[35] 王成东,刘泰康,姜云.无线键盘辐射信号的频谱测试与分析[J].计算机安全,2012(2)
[36] Knight E,Rhythm L.Skeleton keys:the purpose and applications of keyloggers Network Security.http://hdl.handle.net/2327/196879,October 2010
[37] QFX Software-Anti-Keylogging Software.http://www.qfxsoftware.com/
[38] Stefan D,Shu Xiao-kui,Yao Dan-feng.Robustness of keystroke-dynamics based biometrics against synthetic forgeries[J].Computer& Security,2012,31
[39] http://zh.wikipedia.org/wiki/%E7%B4%B0%E8%83%9E%E8%87%AA%E5%8B%95%E6%A9%9F
[40] 李佳静,梁知音,韦韬,等.一种隐式流敏感的木马间谍程序检测方法[J].软件学报,2010,21(6):1426-1437
[41] Yin H,Song D,Egele M,et al.Panorama:Capturing system-wide information flow for malware detection and analysis[C]∥Proc.of the 14th ACM Conf.on Computer and Communications Security.New York:ACM Press,2007:116-127
[42] Marquardt P,Verma A,Carter H,et al.(sp)iPhone:Decoding Vibrations From Nearby Keyboards Using Mobile Phone Acce-lerometers[C]∥CCS’11.Chicago,Illinois,USA,October 2011:17-21
[43] LO’gorman L.Comparing passwords,tokens,and biometrics for user authentication [C]∥Proceedings of the IEEE.2003
[44] 马建坤,黄皓.基于硬件辅助虚拟化技术的反键盘记录器模型[J].计算机科学,2011,38(11)
[45] 高艳,管晓宏,孙国基,等.基于实时击键序列的主机入侵检测[J].计算机学报,2004,27(3)
[46] http://www.securityweek.com/study- reveals-75-percent-indivi-duals-use-same-password-social-networking-and-email
[47] Lee K,Yim K,Security K.A Technological Review[C]∥Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.2011
[48] Lab K,Nikolay G.Keylogger:How they work and how to detect them.http://www.viruslist.com/en/analysis?pubid=204791931,2007
[49] Zhuang Li,Zhou Feng,Tygar J D.Keyboard Acoustic Emanations Revisited[C]∥CCS’05.Alexandria,Virginia,USA,November 2005
[50] Ortolani S,Crispo B.NoisyKey:Tolerating Keyloggers via Keystrokes Hiding[C]∥USENIX2012
[51] Wei Jin-peng,Pu C.Towards a general defense against kernel Queue hooking attacks[J].Computers & Security,2011,31(2):176-191
[52] Shah G,Molina A,Blaze M.Keyboards and Covert Channels[C]∥Security ’06.15th USENIX Security Symposium
[53] 李鹏伟,丁爽,傅建明.面向异常检测的窗口识别[C]∥第九届中国信息与通信安全学术会议,CCICS.2012
[54] Ortolani S,Giurida C,Crispo B.KLIMAX:Proefling MemoryWrite Patterns to Detect Keystroke-Harvesting Malware[C]∥RAID 2011
[55] Majid F.Detecting keylogger virus by monitoring keyboard driverstack[J].Al-Mansour Journal Issue,2011(16)
[56] Xu Kui,Yao Dan-feng,Ma Qiang,et al.User-Behavior BasedDetection of Infection Onset[R].Technical Report TR-10-09.Computer Science,Virginia Tech
[57] Cui Wei-dong,Katz R H,Tan Wai-tian.Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers[C]∥The 21st Annual Computer Security Applications Conference(ACSAC).December 2005
[58] Lu Long,Yegneswaran V,Porras P,et al.BLADE:An Attack-Agnostic Approach for Preventing Drive-By Malware Infections[C]∥CCS 2010

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!