2020
DOI: 10.1088/1757-899x/981/2/022063
|View full text |Cite
|
Sign up to set email alerts
|

Analyze The Legislative Frameworkrelating to Surveillance and Right to Privacy: Issues and Challenges

Abstract: India is world’s largest democracy of the world and accordingly protects free speech and expression through its laws and constitution, still freedom of speech and expression is not absolute and privacy in online sphere is being restricted for many reasons. There are several reasons for which speech and expression is being curtailed such as-defamation, maintenance of national security and communal harmony are major reasons for which they can be curtailed. Under the Indian Constitution, the scope of Article 21 i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…However, latest researches are actively conducted to efficiently steal keyboard data from an attacker's perspective, rather than research from a defense perspective to protect keyboard data. Representative keyboard data attack techniques from an attacker's perspective include WinProc substitution, message hooking, filter driver insertion, interrupt object substitution, IDT (Interrupt Descriptor Table) substitution, direct polling, exploitation of C/D bit vulnerability, and attacks utilizing the RESEND command [6][7][8][9]. Recently, to bypass the defense technique against attacks using C/D bit vulnerabilities [10], an attack technique that classifies random keyboard (hereinafter referred to as scan code) generated by the defender using a machine learning model has emerged.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, latest researches are actively conducted to efficiently steal keyboard data from an attacker's perspective, rather than research from a defense perspective to protect keyboard data. Representative keyboard data attack techniques from an attacker's perspective include WinProc substitution, message hooking, filter driver insertion, interrupt object substitution, IDT (Interrupt Descriptor Table) substitution, direct polling, exploitation of C/D bit vulnerability, and attacks utilizing the RESEND command [6][7][8][9]. Recently, to bypass the defense technique against attacks using C/D bit vulnerabilities [10], an attack technique that classifies random keyboard (hereinafter referred to as scan code) generated by the defender using a machine learning model has emerged.…”
Section: Introductionmentioning
confidence: 99%
“…The PS/2 interface keyboard processes data inputted by the user through the transfer process described above. However, various vulnerabilities occur during this transfer process, and attack techniques using these vulnerabilities are mentioned earlier [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%