Thursday, June 13, 2019

Anti keylogger techniques Literature review Example | Topics and Well Written Essays - 500 words

Anti keylogger techniques - Literature review ExampleThe recent increase in net usage means that that the disadvantages of key-loggers outweigh its productive uses. The source amplifies how key-loggers are a serious threat to privacy and security, especially because they are barely discernible against anti-virus and spyware applications. perfunctory kernel control flow attacks are an innovative group of stealthy kernel-level malware that apply dynamic soft timers to attain considerable work while evading all continual alterations to kernel code or data (Wei, Payne, Giffin, and Pu, 2008). To defend against attacks such as stealthy key logger and a CPU cycle stealer, it is inborn to examine the static analysis of the entire kernel. The source affirms that through this, one can identify and catalog all genuine STIR in a database. At run-time, a reference monitor in a reliable virtual machine allows the implementation of recognized and good soft timer impede requests and averts imple mentation of all unidentified STIRs.Schiffman and Kaplan (2014) present new SMM-based malware that usurps USB host controllers to interrupt USB events. System Management Mode (SMM) in x86 can manage physical computer hardware that the host operating system cannot notice virtually. It is a new class of malware with unbelievable power that helps to transform kernel data structures and trapping on I/O registers to execute PS/2 key loggers. In essence, it helps SMM root kits to manage USB devices straightforwardly without while denying the OS kernel from receiving USB-related hardware interrupts. Schiffman and Kaplan also dispute a proof-of-concept USB key logger, which are harder to identify than previous SMM-based key loggers that are activated by OS actions like port I/O. The source get along suggests extra extensions to this technique and processes to avoid and moderate such attacks.Gupta, Sengupta, Bhattacharyya, and Chattrejee (2009) present a user verification

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.