2013 7th International Conference on Intelligent Systems and Control (ISCO) 2013
DOI: 10.1109/isco.2013.6481194
|View full text |Cite
|
Sign up to set email alerts
|

A framework for detection and prevention of novel keylogger spyware attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Then the keylogger employs the GetKeyboardState API function to determine information about the Keyboard State Table [4]. Generally this thread contains an infinite loop with another loop inside, which requests every key state by applying this function: if a key is pressed, then it is logged [32].…”
Section: Keyboard State Table Methodsmentioning
confidence: 99%
“…Then the keylogger employs the GetKeyboardState API function to determine information about the Keyboard State Table [4]. Generally this thread contains an infinite loop with another loop inside, which requests every key state by applying this function: if a key is pressed, then it is logged [32].…”
Section: Keyboard State Table Methodsmentioning
confidence: 99%
“…The second method, behavior based detection, the main function is to analyze the behavior of either known or unknown spyware [4]. The third method, specification based detection, the process of monitoring programs is involved in executions and detecting the degree of difference from the behavior from the specification [5].…”
Section: Detection Techniquesmentioning
confidence: 99%
“…The detection phase is the comparison of the current system behavior after attack to the normal behavior. The differences between both behaviors are marked as potential threats [5]. The most important advantage of this detection technique is that it is able to find and locate both known and unknown or new instances of spyware.…”
Section: Behavior Based Detectionmentioning
confidence: 99%