DocumentCode
669129
Title
Circumventing keyloggers and screendumps
Author
Sapra, Karan ; Husain, Benafsh ; Brooks, Richard ; Smith
Author_Institution
Electr. & Comput. Eng., Clemson Univ., Clemson, SC, USA
fYear
2013
fDate
22-24 Oct. 2013
Firstpage
103
Lastpage
108
Abstract
We consider keyloggers (hardware or software) and screendumps of virtual keyboards by the local machine. To counter these attacks, we use DirectX 9 libraries[3] on Windows or Linux[5] operating systems. Our approach uses a remote server that communicates securely with the local process. The Direct X mode that we use executes in the GPU while being directly displayed on the screen. There is no direct communication between the operating system and the GPU storage, which allows us to communicate with the user securely even if the local machine is compromised. We present a simple prototype application of this approach, which supports web browsing.
Keywords
Linux; data recording; graphics processing units; keyboards; screens (display); security of data; system monitoring; Direct X mode; DirectX 9 libraries; GPU storage; Linυx operating systems; Web browsing; Windows operating systems; keyloggers circumvention; screendumps circumvention; virtual keyboards; Browsers; Graphics processing units; Hardware; Keyboards; Servers; Spyware;
fLanguage
English
Publisher
ieee
Conference_Titel
Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on
Conference_Location
Fajardo, PR
Print_ISBN
978-1-4799-2534-6
Type
conf
DOI
10.1109/MALWARE.2013.6703691
Filename
6703691
Link To Document