@inproceedings{10.1145/2390317.2390326, author = {Howard, Adam and Hu, Yi}, title = {An Approach for Detecting Malicious Keyloggers}, year = {2012}, isbn = {9781450315388}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/2390317.2390326}, doi = {10.1145/2390317.2390326}, abstract = {Keyloggers are applications that are installed onto computers with the intent of monitoring and storing keystrokes that are input by a user. These keystrokes can either be stored on a physical hard disk or transmitted via a network connection to a remote location. Because of their functions, keyloggers have a potential of being used for malicious purposes. In order to protect privacy, it is important to realize the threat that a keylogger application might pose and identify appropriate methods for detecting it. The method presented in this research provides a standardized approach to detect unknown keylogging software from a computer. We also conducted experiments on a variety of keyloggers to verify the effectiveness of the proposed approach.}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference}, pages = {53–56}, numpages = {4}, keywords = {rootkit, privacy, system hook, keylogger, malicious software}, location = {Kennesaw, Georgia}, series = {InfoSecCD '12} }