DocumentCode :
669129
Title :
Circumventing keyloggers and screendumps
Author :
Sapra, Karan ; Husain, Benafsh ; Brooks, Richard ; Smith
Author_Institution :
Electr. & Comput. Eng., Clemson Univ., Clemson, SC, USA
fYear :
2013
fDate :
22-24 Oct. 2013
Firstpage :
103
Lastpage :
108
Abstract :
We consider keyloggers (hardware or software) and screendumps of virtual keyboards by the local machine. To counter these attacks, we use DirectX 9 libraries[3] on Windows or Linux[5] operating systems. Our approach uses a remote server that communicates securely with the local process. The Direct X mode that we use executes in the GPU while being directly displayed on the screen. There is no direct communication between the operating system and the GPU storage, which allows us to communicate with the user securely even if the local machine is compromised. We present a simple prototype application of this approach, which supports web browsing.
Keywords :
Linux; data recording; graphics processing units; keyboards; screens (display); security of data; system monitoring; Direct X mode; DirectX 9 libraries; GPU storage; Linυx operating systems; Web browsing; Windows operating systems; keyloggers circumvention; screendumps circumvention; virtual keyboards; Browsers; Graphics processing units; Hardware; Keyboards; Servers; Spyware;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on
Conference_Location :
Fajardo, PR
Print_ISBN :
978-1-4799-2534-6
Type :
conf
DOI :
10.1109/MALWARE.2013.6703691
Filename :
6703691
Link To Document :
بازگشت