• DOI: 10.1088/1742-6596/2007/1/012005
  • Corpus ID: 237500025

Keylogger Detection and Prevention

  • Arjun Singh , Pushpa Choudhary , +1 author Dheerendra Kumar Tyagi
  • Published in Journal of Physics… 1 August 2021
  • Computer Science
  • Journal of Physics: Conference Series

9 Citations

Keylogger detection: a systematic review, preventing malicious use of keyloggers using anti-keyloggers, keylogger malware detection using machine learning model for platform-independent devices, a novel information stealing malware, an improved password-authentication model for access control in connected systems, forensic implication of a cyber-enabled fraud taking advantage of an offline adversary-in-the-middle (aitm) attack, preserving security of crypto transactions with machine learning methodologies, enhancing data privacy of iot healthcare with keylogger attack mitigation, deep image: a precious image based deep learning method for online malware detection in iot environment, 10 references, bait your hook: a novel detection technique for keyloggers, detecting kernel level keyloggers through dynamic taint analysis, anti-hook shield against the software key loggers, hardware keylogger detection, a layered architecture for detecting malicious behaviors, related papers.

Showing 1 through 3 of 0 Related Papers

Accessibility Links

  • Skip to content
  • Skip to search IOPscience
  • Skip to Journals list
  • Accessibility help
  • Accessibility Help

Click here to close this panel.

Purpose-led Publishing is a coalition of three not-for-profit publishers in the field of physical sciences: AIP Publishing, the American Physical Society and IOP Publishing.

Together, as publishers that will always put purpose above profit, we have defined a set of industry standards that underpin high-quality, ethical scholarly communications.

We are proudly declaring that science is our only shareholder.

Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm

Robbi Rahim 1 , Heri Nurdiyanto 2 , Ansari Saleh A 3,4 , Dahlan Abdullah 5 , Dedy Hartama 6 and Darmawan Napitupulu 7

Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series , Volume 954 , Joint Workshop of KO2PI & 2nd International Conference on Mathematics, Science, Technology, Education, and their Applications (2nd ICMSTEA) 3–4 October 2016, Makassar, Indonesia Citation Robbi Rahim et al 2018 J. Phys.: Conf. Ser. 954 012008 DOI 10.1088/1742-6596/954/1/012008

Article metrics

7248 Total downloads

Share this article

Author e-mails.

[email protected]

Author affiliations

1 School of Computer Engineering and Communication, Universiti Malaysia Perlis, Malaysia

2 Department of Informatics Engineering, STMIK Dharma Wacana, Metro Lampung, Indonesia

3 Department of Statistics, Universitas Negeri Makassar, Makassar, Indonesia

4 AHMAR Institute, Makassar, Indonesia

5 Department of Informatics, Universitas Malikussaleh, Aceh, Indonesia

6 Department of Information System, STIKOM Tunas Bangsa, Pematang Siantar, Indonesia

7 Research Center for Quality System and Testing Technology, Indonesian Institute of Sciences, Indonesia

Buy this article in print

The development of technology is very fast, especially in the field of Internet technology that at any time experiencing significant changes, The development also supported by the ability of human resources, Keylogger is a tool that most developed because this application is very rarely recognized a malicious program by antivirus, keylogger will record all activities related to keystrokes, the recording process is accomplished by using string matching method. The application of string matching method in the process of recording the keyboard is to help the admin in knowing what the user accessed on the computer.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence . Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

System Monitoring and Security Using Keylogger

Profile image of IJCSMC Journal

Related Papers

Mark Dishaw

Copy right Idea Grou p Inc. Copy right Idea Grou p Inc. ABSTRACT This paper examines the use of IT systems such as Proxy Servers, and “Carnivore-Like” technologies to create electronic panopticons for the purpose of monitoring an employee behavior, Internet Use, in the workplace. An electronic panopticon is a device or system that allows for the continuous monitoring of an individual’s behavior. This type of system when badly implemented can cause serious invasions of employee privacy in the workplace. Such privacy invasions are unwelcome and are frequently resisted. Managers should avoid using this control technique except when absolutely necessary due to the possibility of unintended negative effects. Monitoring Internet Use In the Workplace: Caution Is Advised

research paper on keylogger

Jeffrey Stanton

Darcie Lyons-Hutton

Malware and botnets pose the greatest risk to computer network systems. These threats include Trojan horses, spyware and keyloggers, all designed to infiltrate systems and obtain information without consent, and much to the detriment of business operation. However, not all threats come from outside of any given business system. It professionals, management, and employees alike must address and work to minimise insider risks caused by those with access to business systems. Human error and misuse of systems can lead to an unsafe system and loss of profit and employment. To counter threats to systems and minimise risk, businesses should be implementing controlled access to their networks and systems via access control, passwords, user control, and data encryption.

International Journal of Integrative Sciences

Ditonius Zebua

Along with the development of increasingly advanced technology, the level of need for information security is very important. With the development of information, new problems arise regarding computer security, an example of computer security that often occurs is data theft. Data security in accessing a computer is a form that must be considered both physically and non-physically. One form of data theft crime is recording traces of a computer keyboard with the help of hardware or software. Keylogger is a data theft technique by recording typing on a computer keyboard, by recording when the computer is entered, intruders can enter and steal it. The purpose of this paper is to understand how keyloggers work so that prevention can be carried out by carrying out various kinds of solutions and also to maintain data security systems and know supporting and anti-keylogger software

U. Pa. J. Lab. & Emp. L.

Michael Rustad

International Journal for Research in Applied Science & Engineering Technology (IJRASET)

IJRASET Publication

Keyloggers or keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard. Keyloggers are a form of spyware where users are unaware their actions are being tracked. Keyloggers can be used for a variety of purposes; hackers may use them to maliciously gain access to your private information, while employers might use them to monitor employee activities. Some keyloggers can also capture your screen at random intervals; these are known as screen recorders. Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions. You'll find use of keyloggers in everything from Microsoft products to your own employer's computers and servers. In some cases, your spouse may have put a keylogger on your phone or laptop to confirm their suspicions of infidelity. Worse cases have shown criminals to implant legitimate websites, apps, and even USB drives with keylogger malware. Whether for malicious intent or for legitimate uses, you should be aware how keyloggers are affecting you. First, we'll further define keystroke logging before diving into how keyloggers work. Then you'll be able to better understand how to secure yourself from unwanted eyes. You might find legal keyloggers are in your daily life more than you realized. Fortunately, the power to control your data is often in your hands if the monitoring party has asked for access. Outside of employment, you can simply decline permission to the keyloggers if you so choose.

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

https://www.ijert.org/keylogger-use-for-security-of-a-personal-computer https://www.ijert.org/research/keylogger-use-for-security-of-a-personal-computer-IJERTV2IS1379.pdf Roaming users who use untrusted machines to access password protected accounts have few good options.An internet cafe machine can easily be running a keylogger. The roaming user has no reliable way of determining whether it is safe, and has no alternative to typing the password. We describe a simple trick the user can employ that is entirely effective in concealing the password. We verify its efficacy against the most popular keylogging programs.

frances grodzinsky

Employment Relations Today

Mateja Gorenc

Employee monitoring is by no means a new phenomenon in the workplace. The advent of e-mail and the Internet has afforded many tech-savvy companies with the opportunity to develop sophisticated electronic monitoring devices so employers can monitor and protect ...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

devashree kataria

Journal of Information System Security

Rebecca Bennett , Paul Benjamin Lowry

Chinmay Raut

Benjamin Kuperman

Arlene Nicholas

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Microsoft rethinks Recall feature for Copilot after backlash over security

(Credit: Robert – stock.adobe.com)

(Credit: Robert – stock.adobe.com)

Microsoft’s upcoming AI-powered Windows “Recall” feature, which takes screenshots of users’ active screen every few seconds, will undergo some changes following backlash from security experts.

The feature received a large amount of criticism from consumers and industry professionals immediately after it was announced on May 20, with Malwarebytes calling it a “built-in keylogger” and software engineer and Web3 critic Molly White calling it “spyware.”

The concerns were compounded by the fact that Recall does not, according to Microsoft, censor sensitive information in the snapshots it takes, such as passwords or financial information. This would potentially make the database of Recall snapshots on a user’s computer a gold mine for hackers, with tons of sensitive data all in one place and easily searchable using the AI-powered search feature.

Microsoft insisted users’ privacy was protected due to all Recall data being stored locally and encrypted by Device Encryption or BitLocker. The feature, which would be enabled by default on Copilot+ PCs, could also be disabled and configured to not record specific sites and apps.

However, in the weeks since Recall was announced, multiple security pros have put available previews to the test and demonstrated ways the Recall database can be accessed and exploited to steal sensitive data en masse.

For example, Alex Hagenah, head of cyber controls at SIX Group and technical advisory board member at HackerOne, developed a “very simple’ proof-of-concept tool called “TotalRecall,” which copies, searches and extracts information from the Recall database file.

Additionally, James Forshaw, a security research in Google Project Zero, published a blog post about bypassing access control lists, which includes an edit revealing that the Recall database can be accessed by a user without administrative privileges by using a token from the Windows AIXHost.exe process or simply rewriting the discretionary access control list, as the database is considered to be owned by the user.

In response to “customer feedback,” Microsoft announced in a blog post on Friday that Recall would no longer be activated by default, requiring users to opt-in to use the feature. Additionally, users will need to complete the Windows Hello biometric enrollment process to enable Recall, lowering the chance that a hacker could enable it on the machine of a user who had opted out.

Proof of presence through Windows Hello will be required to view the Recall timeline and use the AI-powered search tool, and the snapshots will only be decrypted upon user authentication via Windows Hello Enhanced Sign-in Security, Microsoft said.

“We want to reinforce what has previously been shared from David Weston, vice president of Enterprise and OS Security, about how Copilot+ PCs have been designed to be secure by default,” the blog post stated.

Kevin Beaumont, a security researcher and former senior threat intelligence analyst at Microsoft, who has been a vocal critic of Recall since its announcement, responded positively to the update.

“Turns out speaking up works,” Beaumont wrote on X .

“There are obviously going to be devils in the details – potentially big ones – but there’s some good elements here. Microsoft needs to commit to not trying to sneak users to enable it in the future, and it needs turning off by default in Group Policy and Intune for enterprise orgs,” Beaumont added .

Laura French

Significant compromise likely with new EmailGPT vulnerability

SC Staff June 7, 2024

Widely known artificial intelligence email assistant EmailGPT was discovered by researchers from Synopsys' Cybersecurity Research Center to be impacted by a medium-severity prompt injection vulnerability, which could be exploited to enable data exposure, financial loss, and denial-of-service attacks, according to Hackread.

Microsoft Copilot AI chatbot brand

Potential malware compromise of data from Microsoft’s Recall feature detailed

SC Staff June 6, 2024

Microsoft's new "Recall" feature, an artificial intelligence-powered functionality enabling the logging of past user activity in its recently introduced Copilot+ PCs, was regarded by cybersecurity researchers as vulnerable to cyberattacks that could compromise its stored data, Security Affairs reports.

Inside Microsoft's AI strategy,

Inside Microsoft’s take on AI

Vivek Vinod Sharma June 6, 2024

As the largest investor in ChatGPT and developers of Copilot, Microsoft has become an important AI stakeholder and innovator – the company aims to foster responsible use of AI led by humans.

Get daily email updates

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy .

IMAGES

  1. (PDF) Survey of Keylogger Technologies

    research paper on keylogger

  2. (PDF) Mobile Keylogger Detection By Using Machine Learning Technique

    research paper on keylogger

  3. 1168156 3.docx

    research paper on keylogger

  4. Proposed Methodology of Unprivileged Keylogger Detection

    research paper on keylogger

  5. SOLUTION: What is keylogger and benefits and keys

    research paper on keylogger

  6. SOLUTION: What is keylogger and benefits and keys

    research paper on keylogger

VIDEO

  1. Xenotix XSS Exploit Framework

  2. Keylogger

  3. This Keypad Can Do Anything

  4. Keyloggers Theory: Behind the Scenes

  5. [11] Review

  6. How to Create Keylogger File in Notepad

COMMENTS

  1. (PDF) Keylogger Detection and Prevention

    Keylogger detection and prevention is a challenging task for security m anagers. Unlike. traditional viruses and worms, advanced Key loggers are present which are near to impossible to det ect ...

  2. Keylogger Detection: A Systematic Review

    Keyloggers are a form of spyware that monitors the activities carried out on a computer system and stores sensitive information such as the keystrokes made by the user and stores it in a file to be sent to third-parties. Keyloggers have also been used as a tool for cybercriminals to steal sensitive information such as email passwords, credit card pins, passwords to sites that contain more ...

  3. [2312.10445] The Evolution of Keylogger Technologies: A Survey from

    View a PDF of the paper titled The Evolution of Keylogger Technologies: A Survey from Historical Origins to Emerging Opportunities, by Marco Salas-Nino and 4 other authors. View PDF Abstract: As the digital world evolves, so do the threats to our security do too. Keyloggers were once a large threat to the cyber world.

  4. PDF The Evolution of Keylogger Technologies: A Survey from Historical

    The battle against the Zeus keylogger is an important event in cybersecurity. Every individual in cybersecu-rity imaginable worked together from the inter-national community, cybersecurity firm, all the way to the law enforcements, to stop the Zeus network from inflicting anymore damage on in-nocent civilians.

  5. Keylogger Detection and Prevention

    Keylogger Detection and Prevention. Arjun Singh 1, Pushpa Choudhary 1, Akhilesh kumar singh 1 and Dheerendra kumar tyagi 1. Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 2007, 3rd International Conference on Computational & Experimental Methods in Mechanical Engineering ICCEMME (2021) 11-13 February 2021, Uttar Pradesh, India Citation Arjun Singh ...

  6. V &RQI 6HU

    Keylogger is a device either hardware or software used to monitor keyboard keystrokes [9] [10]. A keylogger will usually store the monitoring results of the keyboard keystrokes into a log/record/record file. Some specific keylogger can even send the recording to specific e-mail periodically [5] [11].

  7. Detect keyloggers by using Machine Learning

    This paper seeks to detect each application's set of rights and storage levels and distinguish between programs with proper access and keylogger applications that can misuse permissions. This keylogger detection technique is fully black-box; it is based on behavioral traits that are universal to all keyloggers and do not rely on the keylogger ...

  8. A Novel Approach of Unprivileged Keylogger Detection

    Nowadays, computers are used everywhere to carry out daily routine tasks. The input devices i.e. keyboard or mouse are used to feed input to computers. The surveillance of input devices is much important as monitoring the users logging activity. A keylogger also referred as a keystroke logger, is a software or hardware device which monitors every keystroke typed by a user. Keylogger runs in ...

  9. Keylogger Detection and Prevention

    This paper presents an outline of Keyloggers programs, types, qualities of Keeloggers and philosophy they use, and breaks down the current discovery procedures. Keyloggers are kind of a rootkit malware that catch composed keystroke occasions of the console and save into log record, hence, it can capture delicate data, for example, usernames, PINs, and passwords, in this manner communicates ...

  10. PDF Enhancing Digital Security With The Advanced Keylogger Project

    The Advanced Keylogger Project stands as a testament to this pressing need, offering a sophisticated solution to the intricate challenges posed by cybersecurity threats. This research paper delves into the intricacies of the Advanced Keylogger Project, dissecting its multifaceted approach to fortifying digital security.

  11. PDF Survey on Keystroke Logging Attacks

    IJCRT2104074 International Journal of Creative Research Thoughts (IJCRT) www.ijcrt.org 504 masking in kernel mode and masking in user mode. during this paper we tend to specialise in the literature survey that is said to keylogger, its types, interference detection of keylogger attacks and its varied applications.

  12. Keylogger Application to Monitoring Users Activity with ...

    Paper • The following article is Open access. ... 7 Research Center for Quality System and Testing Technology, Indonesian Institute of Sciences, ... Keylogger is a tool that most developed because this application is very rarely recognized a malicious program by antivirus, keylogger will record all activities related to keystrokes, the ...

  13. PDF Analysis and Implementation of Decipherments of KeyLogger

    keystroke sequences in input and observes the behavior of the keylogger in output to unambiguously identify it among all the running processes. We have prototyped our technique as an unprivileged application, hence matching the same ease of deployment of a keylogger executing in unprivileged mode. RESEARCH PAPER Medical Science

  14. System Monitoring and Security Using Keylogger

    Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320-088X IJCSMC, Vol. 2, Issue. 3, March 2013, pg.106 - 111 RESEARCH ARTICLE System Monitoring and Security Using Keylogger Preeti Tuli 1, Priyanka Sahu2 1 Reader, Department Of Computer Science Dimat, CSVTU, Raipur ...

  15. Keyloggers: Increasing threats to computer security and privacy

    Keyloggers are powerful tools that can perform many task. Standard security measures for machine-to-machine interfaces do not protect computer systems from keylogger attacks. Human-to-machine interfaces must be considered to combat keylogger intrusions. The judicious use of keyloggers by employers and computer owners could, in some situations, improve security, privacy, and efficiency. But the ...

  16. PDF Keyloggers: A Malicious Attack

    International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 ... concept behind Keylogger Protection [6] In this paper we focus on the literature survey which is related to keylogger, its working, prevention detection of

  17. PDF Keylogger for Windows Using Python

    System administrators can use keyloggers for systems, i.e. for detecting suspicious users. Keyloggers can effectively assist a computer forensics analyst in the examination of digital media. Keyloggers are especially effective in monitoring ongoing crimes. Keystroke loggers can be used to capture and compile a record of all typed keys.

  18. Investigating the keylogging threat in android

    Investigating the keylogging threat in android — User perspective (Regular research paper) ... A malicious developer may build a keylogger from scratch or utilize an existing keyboard. Furthermore, users may unknowingly install keyloggers from the online app markets or may use a keylogger that a malicious user with physical access has ...

  19. Microsoft rethinks Recall feature for Copilot after backlash over

    Additionally, James Forshaw, a security research in Google Project Zero, published a blog post about bypassing access control lists, which includes an edit revealing that the Recall database can ...