期刊文献+

敏感信息输入安全技术探究 被引量:3

Sensitive Information Input Safety Technology
下载PDF
导出
摘要 攻击者有多种方法可以窃取到计算机用户使用键盘输入的信息:可以通过一定设备在物理世界进行偷窥、监听或过滤,也可以通过键盘记录器在操作系统内核层或者应用层进行挂钩或者轮询。其中,后者可以远程、精确地获取信息,造成严重威胁。文章从现有研究和应用角度出发,采取了更改键盘信息输入流程、加入干扰信息、使用软键盘等多种方法对用户敏感信息的安全输入进行防护。从攻防两个角度对敏感信息的安全输入进行了分析与实验。 The attacker has many kinds of methods can steal to computer users to use the keyboard to enter inforation: can peep, monitoring or filtering in the physical world by certain equipment, can also through the keyboard recorder in the operating system kernel layer and application layer are linked or polling. Among them, the latter can be remote, accurate access to information, which poses a serious threat. Based on the existing research and application point of view, to change keyboard input process, join the interference information, multiple use soft keyboard method of user sensitive information security input protection. Analysis and experiments have been carried out safety input of sensitive information from two angles of attack and defense.
出处 《信息网络安全》 2013年第3期82-85,共4页 Netinfo Security
关键词 键盘记录器 敏感信息 虚拟键盘 异常检测 安全防护 keyboard recorder sensitive information virtual keyboard anomaly detection safety protection
  • 相关文献

参考文献7

  • 1A Secure User Interface for Web Applications Running Under an UntrustedOperating System, CIT 2010.
  • 2Detecting keylogger virus by monitoring keyboard driver stack, AI- Mansour Journal Issue 2011.
  • 3ClearShot: Eavesdropping on Keyboard Input from Video, 2008 IEEE Symposium oll Security and Privacy.
  • 4Keyboard Acoustic Emanations Revisited, CCS' 05.
  • 5Philip Marquardt, iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers, CCS' 11.
  • 6http://www.securelist.com/en/analysis?pubid=20479 1931.
  • 7Stefano Ortolani, Bnmo Crispo, NoisyKey: Tolerating Keyloggers via Keystrokes Hiding, Proc. of the 7th USENIX Workshop on Hot Topics, 2012.

同被引文献6

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部