This repository has been archived on 2025-01-05. You can view files and clone it, but cannot push or open issues or pull requests.
keylogger-detector/doc/research/acm_2390317.2390326.bib
2023-06-13 11:39:09 +02:00

17 lines
1.3 KiB
BibTeX
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@inproceedings{10.1145/2390317.2390326,
author = {Howard, Adam and Hu, Yi},
title = {An Approach for Detecting Malicious Keyloggers},
year = {2012},
isbn = {9781450315388},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2390317.2390326},
doi = {10.1145/2390317.2390326},
abstract = {Keyloggers are applications that are installed onto computers with the intent of monitoring and storing keystrokes that are input by a user. These keystrokes can either be stored on a physical hard disk or transmitted via a network connection to a remote location. Because of their functions, keyloggers have a potential of being used for malicious purposes. In order to protect privacy, it is important to realize the threat that a keylogger application might pose and identify appropriate methods for detecting it. The method presented in this research provides a standardized approach to detect unknown keylogging software from a computer. We also conducted experiments on a variety of keyloggers to verify the effectiveness of the proposed approach.},
booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference},
pages = {5356},
numpages = {4},
keywords = {rootkit, privacy, system hook, keylogger, malicious software},
location = {Kennesaw, Georgia},
series = {InfoSecCD '12}
}