Computer Science ›› 2013, Vol. 40 ›› Issue (10): 10-17.
Previous Articles Next Articles
LI Peng-wei,FU Jian-ming,SHA Le-tian and DING Shuang
[1] Chahrvin S,Line S.Keyloggers-your security nightmare?[J].Computer Fraud & Security,2007(7):10-11 [2] Holz T.Markus Engelberth Felix Freiling,Learning More About the Underground Economy:A Case-Study of Keyloggers and Dropzones[C]∥Computer Security-ESORICS.2009 [3] Chang H.The study on end-to-end security for ubiquitous commerce[J].Supercomput,2011,55:228-245 [4] Yamamoto H,Hayasaki Y,Nishida N.Securing information dis-play by use of visual cryptography[J].Optics Letters,September 1,2003,28(17):1564-1566 [5] Hung C-W ,Hsu F-H,Chen S-J,et al.QTE-based Solution to Keylogger Attacks[C]∥SECURWARE 2012:The Sixth International Conference on Emerging Security Information,Systems and Technologies.2012 [6] Balzarotti D,Cova M,Vigna G.ClearShot:Eavesdropping onKeyboard Input from Video[C]∥IEEE Symposium on Security and Privacy.2008 [7] 付永庆,郑莉,邵学辉.一种监听键盘录入信息的新方法[J].哈尔滨工程大学学报,2008,29(2) [8] Sagiroglu S.Keyloggers[J].IEEE Technology and Society Ma-gazine,2009,28(3):10-17 [9] Daniel G.keyboard encryption[J].IEEE,2002,21(3):40-42 [10] Ortolani S,Giurida C,Crispo B.Bait Your Hook:A Novel Detection Technique for Keyloggers[C]∥RAID 2010.LNCS 6307,2010:198-217 [11] Fu Jun,Liang Yi-wen,Tan Cheng-yu,et al.Detecting Software Keyloggers with Dendritic Cell Algorithm[C]∥2010International Conference on Communications and Mobile Computing.2010 [12] Yin Heng,Poosankam P,Hanna S,et al.HookScout:Proactive Binary-Centric Hook Detection[J].DIMVA 2010.LNCS 6201,2010:1-20 [13] Sreenivas R S,Anitha D R.Detecting keyloggers based on traffic analysis with periodic behavior[J].Network Security,2011,2011(7):14-19 [14] Yim K.A new noise mingling approach to protect the authentication password[C]∥2010International Conference on Complex,Intelligent and Software Intensive Systems.2010 [15] Herley C,Florencio D.Microsoft Research,Redmond.HowTo Login From an Internet Cafe Without Worrying About Keyloggers[C]∥Symposium on Usable Privacy and Security(SOUPS)’06 [16] Li Chun-xiao,Raghunathan A,Jha N K.A Secure User Interface for Web Applications Running Under an Untrusted Operating System[C]∥201010th IEEE International Conference on Computer and Information Technology(CIT 2010) [17] Mannan M,van Oorschot P C.Using a Personal Device toStrengthen Password Authentication from an Untrusted Computer[C]∥Proceedings of the 11th International Conference on Financial Cryptography and Data Security.2007:88-103 [18] Mihajlov M,Jerman-Blazˇic B.On designing usable and secure recognition-based graphical authentication mechanisms[J].Interacting with Computers,2011,23:582-593 [19] Raguram R,White A M,Goswami D.Fabian Monrose and Jan-Michael Frahm iSpy:Automatic Reconstruction of Typed Input fromCompromising Refiections[C]∥CCS’11.Chicago,Illinois,USA,October 2011 [20] Lim J.Defeat Spyware With Anti-Screen Capture Technology Using Visual Persistence[C]∥Symposium On Usable Privacy and Security(SOUPS).2007 [21] Gong Shang-fu,Lin Jun,Sun Yi-zhen.Design and Implementation of Anti-Screenshot Virtual Keyboard Applied in Online Banking[C]∥E-Business and E-Government(ICEE).2010:1320-1322 [22] Agarwal M,Mehra M,Pawar R,et al.Secure Authentication using Dynamic Virtual Keyboard Layout[C]∥International Conference and Workshop on Emerging Trends in Technology(ICWET 2011).TCET,Mumbai,India,2011 [23] Mohanty D.Defeating Virtual Keyboard Protection[C]∥Coffee and Security(C&S)2006 [24] Dorrendorf L,Gutterman Z.Cryptanalysis of the Random Number Generator of the Windows Operating System[J].ACM Transactions on Information and System Security,Publication date,2009,13(1) [25] Krishnamurthy,Hema.Method and system for a secure virtual keyboard[P].United States Patent 8176324 [26] Heron S,Director M,Box N.The rise and rise of the keyloggers[J].Network Security,2007(6):4-6 [27] 魏东,车文刚,段继磊,等.利用日志钩子函数实现windows 系统信息的捕获[J].昆明理工大学学报:理工版,2002(4) [28] 高志新,应力.访问键盘芯片获取PS/2键盘按键信息[J].信息安全与通信保密,2011(6) [29] 王海晨,施勇,薛质.基于Windows平台的安全密码框研究与实现[J].信息安全与通信保密,2011(4) [30] Vishnani K,Pais A R,Mohandas R.An In-Depth Analysis of the Epitome of Online Stealth:Keyloggers;and Their Countermeasures[C]∥ACC 2011,Part III.CCIS 192,2011:10-19 [31] MSDN.About Row Input.http://msdn.microsoft.com/en-us/library/windows/desktop/ms645543%28v=vs.85%29.aspx [32] Nasaka K,Takami T,Yamamoto T.A keystroke logger detection using keyboard-input-related API monitoring[C]∥2011International Conference on Network-Based Information Systems [33] 谭文,杨潇,邵坚磊.寒江独钓——Windows内核安全编程[M].北京:电子工业出版社,2009:57-97 [34] Lee K,Kim W,Bae K,et al.A Solution to Protecting USB Keyboard Data[C]∥2010International Conference on Broadband,Wireless Computing,Communication and Applications [35] 王成东,刘泰康,姜云.无线键盘辐射信号的频谱测试与分析[J].计算机安全,2012(2) [36] Knight E,Rhythm L.Skeleton keys:the purpose and applications of keyloggers Network Security.http://hdl.handle.net/2327/196879,October 2010 [37] QFX Software-Anti-Keylogging Software.http://www.qfxsoftware.com/ [38] Stefan D,Shu Xiao-kui,Yao Dan-feng.Robustness of keystroke-dynamics based biometrics against synthetic forgeries[J].Computer& Security,2012,31 [39] http://zh.wikipedia.org/wiki/%E7%B4%B0%E8%83%9E%E8%87%AA%E5%8B%95%E6%A9%9F [40] 李佳静,梁知音,韦韬,等.一种隐式流敏感的木马间谍程序检测方法[J].软件学报,2010,21(6):1426-1437 [41] Yin H,Song D,Egele M,et al.Panorama:Capturing system-wide information flow for malware detection and analysis[C]∥Proc.of the 14th ACM Conf.on Computer and Communications Security.New York:ACM Press,2007:116-127 [42] Marquardt P,Verma A,Carter H,et al.(sp)iPhone:Decoding Vibrations From Nearby Keyboards Using Mobile Phone Acce-lerometers[C]∥CCS’11.Chicago,Illinois,USA,October 2011:17-21 [43] LO’gorman L.Comparing passwords,tokens,and biometrics for user authentication [C]∥Proceedings of the IEEE.2003 [44] 马建坤,黄皓.基于硬件辅助虚拟化技术的反键盘记录器模型[J].计算机科学,2011,38(11) [45] 高艳,管晓宏,孙国基,等.基于实时击键序列的主机入侵检测[J].计算机学报,2004,27(3) [46] http://www.securityweek.com/study- reveals-75-percent-indivi-duals-use-same-password-social-networking-and-email [47] Lee K,Yim K,Security K.A Technological Review[C]∥Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.2011 [48] Lab K,Nikolay G.Keylogger:How they work and how to detect them.http://www.viruslist.com/en/analysis?pubid=204791931,2007 [49] Zhuang Li,Zhou Feng,Tygar J D.Keyboard Acoustic Emanations Revisited[C]∥CCS’05.Alexandria,Virginia,USA,November 2005 [50] Ortolani S,Crispo B.NoisyKey:Tolerating Keyloggers via Keystrokes Hiding[C]∥USENIX2012 [51] Wei Jin-peng,Pu C.Towards a general defense against kernel Queue hooking attacks[J].Computers & Security,2011,31(2):176-191 [52] Shah G,Molina A,Blaze M.Keyboards and Covert Channels[C]∥Security ’06.15th USENIX Security Symposium [53] 李鹏伟,丁爽,傅建明.面向异常检测的窗口识别[C]∥第九届中国信息与通信安全学术会议,CCICS.2012 [54] Ortolani S,Giurida C,Crispo B.KLIMAX:Proefling MemoryWrite Patterns to Detect Keystroke-Harvesting Malware[C]∥RAID 2011 [55] Majid F.Detecting keylogger virus by monitoring keyboard driverstack[J].Al-Mansour Journal Issue,2011(16) [56] Xu Kui,Yao Dan-feng,Ma Qiang,et al.User-Behavior BasedDetection of Infection Onset[R].Technical Report TR-10-09.Computer Science,Virginia Tech [57] Cui Wei-dong,Katz R H,Tan Wai-tian.Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers[C]∥The 21st Annual Computer Security Applications Conference(ACSAC).December 2005 [58] Lu Long,Yegneswaran V,Porras P,et al.BLADE:An Attack-Agnostic Approach for Preventing Drive-By Malware Infections[C]∥CCS 2010 |
No related articles found! |
|