期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2014
卷号:5
期号:2
页码:1867-1870
出版社:TechScience Publications
摘要:Key loggers have been posing a threat to the confidentiality of sensitive information such as passwords, credit card numbers..Etc. Keyloggers are very difficult to identify as they either work in stealth mode or pose themselves as legitimate programs to the system. There are several techniques for overcoming the menace of key loggers, but none is sufficient on their own. There needs to be a combination of several techniques to effectively eliminate the problem. We examine various techniques for detection of key logger attacks and concentrate upon the password input isolation using hypervisor in order to mitigate their effect as much as possible.
关键词:Key loggers; Keyloggers; Hypervisor; trusted;computing base; malware; data stealing