An in-depth analysis of the epitome of online stealth: Keyloggers; and their countermeasures

dc.contributor.authorVishnani, K.
dc.contributor.authorPais, A.R.
dc.contributor.authorMohandas, R.
dc.date.accessioned2026-02-06T06:40:39Z
dc.date.issued2011
dc.description.abstractMalware came into existence ever since the inception of the computers itself and its spread has been gaining momentum as a result of persistent success and evolution of the Internet. Cyber world has been noticing a shift in the goals of malware writers, which would only become more insidious with time. Currently the matter of great concern for Internet users is that of online stealth. In this paper we discuss in detail about the epitome of online stealth, the keyloggers; present an analysis of few well known anti-keyloggers; list a set of counter-measures for the users based on our analysis; and also present our approach for client side authentication to reduce the attack surface available to the hackers. © 2011 Springer-Verlag.
dc.identifier.citationCommunications in Computer and Information Science, 2011, Vol.192 CCIS, PART 3, p. 10-19
dc.identifier.issn18650929
dc.identifier.urihttps://doi.org/10.1007/978-3-642-22720-2_2
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/33065
dc.subjectkeylogger
dc.subjectmalware
dc.subjectpassword stealing
dc.subjectrootkits
dc.titleAn in-depth analysis of the epitome of online stealth: Keyloggers; and their countermeasures

Files