2018
DOI: 10.4108/eai.15-10-2018.155740
|View full text |Cite
|
Sign up to set email alerts
|

Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus

Abstract: Keyloggers are serious threats for computer users both private and commercial. If an attacker is capable of installing this malware on the victim's machine then he or she is able to monitor keystrokes of a user. This keylog contains login information. As a consequence, protection and detection techniques against keyloggers become increasingly better. This article presents the method of Mouse Underlaying for creating a new kind of software based keyloggers. This method is implemented in Java for testing counter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…In other words, both User Imitating variants will work perfectly. The victim can be fooled into confirming this message by applying a social engineering technique [71].…”
Section: Evaluation a Operating System Compatibilitymentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, both User Imitating variants will work perfectly. The victim can be fooled into confirming this message by applying a social engineering technique [71].…”
Section: Evaluation a Operating System Compatibilitymentioning
confidence: 99%
“…In this way it may be seen as a discrimination. Besides, tools for remote maintenance apply this functionality, too [71]. • A process shall be not allowed to switch to another (additional) desktop by employing a corresponding API call or terminal command without the user's awareness.…”
Section: Measures Against Phantom Malwarementioning
confidence: 99%