• DocumentCode
    669129
  • Title

    Circumventing keyloggers and screendumps

  • Author

    Sapra, Karan ; Husain, Benafsh ; Brooks, Richard ; Smith

  • Author_Institution
    Electr. & Comput. Eng., Clemson Univ., Clemson, SC, USA
  • fYear
    2013
  • fDate
    22-24 Oct. 2013
  • Firstpage
    103
  • Lastpage
    108
  • Abstract
    We consider keyloggers (hardware or software) and screendumps of virtual keyboards by the local machine. To counter these attacks, we use DirectX 9 libraries[3] on Windows or Linux[5] operating systems. Our approach uses a remote server that communicates securely with the local process. The Direct X mode that we use executes in the GPU while being directly displayed on the screen. There is no direct communication between the operating system and the GPU storage, which allows us to communicate with the user securely even if the local machine is compromised. We present a simple prototype application of this approach, which supports web browsing.
  • Keywords
    Linux; data recording; graphics processing units; keyboards; screens (display); security of data; system monitoring; Direct X mode; DirectX 9 libraries; GPU storage; Linυx operating systems; Web browsing; Windows operating systems; keyloggers circumvention; screendumps circumvention; virtual keyboards; Browsers; Graphics processing units; Hardware; Keyboards; Servers; Spyware;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on
  • Conference_Location
    Fajardo, PR
  • Print_ISBN
    978-1-4799-2534-6
  • Type

    conf

  • DOI
    10.1109/MALWARE.2013.6703691
  • Filename
    6703691