期刊文献+

键盘输入安全研究 被引量:4

Research of Keyboard Input Security
下载PDF
导出
摘要 键盘记录器是网络用户面临的主要安全威胁之一。以保障敏感信息的安全输入为出发点,分析了按键信息传输流程,系统总结了键盘输入信息所面临的来自物理层、内核层、应用层的截获、查询、旁路等类型的安全威胁以及现有研究和应用的相应防御措施;介绍了软键盘所面临的偷窥、消息截获、截屏等威胁及其防御措施,提出鼠标记录攻击、控件分析攻击等新的威胁以及相应的对策;然后对现有研究和应用的敏感信息输入进行了安全性测试;最后介绍了现有研究中基于行为的键盘记录器检测方法。 Keylogger is one of the most serious threats to the Internet users. In order to protect sensitive information in-put, the study summarized the threats along the process of information inputting using a keyboard and corresponding preventive measures. These threats work at different levels(physical/ring 0/ring 3)and use different attack approach (Query/Hook/Bypass). We summarized the threats faced by soft keyboard such as peep, screenshots, or information in- tercepted. We also proposed new attacks based on mouse behavior record, element analysis and measures to defense these attacks. We then tested the performance of security measures which are employed by existing research and appli-cations. At last, the existing research in behavior-based keyloggers detection was summarized.
出处 《计算机科学》 CSCD 北大核心 2013年第10期10-17,共8页 Computer Science
基金 国家自然科学基金项目(61202387) 国家科技重大专项项目(2010ZX03006-001-01) 高等学校博士学科点专项科研基金(20120141110002)资助
关键词 键盘记录器 敏感信息输入 键盘 软键盘 Keylogger, Sensitive information input, Keyboard, Virtual keyboard
  • 相关文献

参考文献57

  • 1Chahrvin S, Line S. Keyloggers--your security nightmare? [J]. Computer Fraud & Security, 2007 (7):10-11.
  • 2Holz T. Markus Engelberth Felix Freiling, Learning More A- bout the Underground Economy: A Case-Study of Keyloggers and Dropzones[C]//Computer Seeurity-ESORICS. 2009.
  • 3Chang H. The study on end-to-end security for ubiquitous com- merce[J]. Supereomput, 2011,55 : 228-245.
  • 4Yarnamoto H, Hayasaki Y, Nishida N. Seeuring information dis- play by use of visual eryptography[J]. Optics Letters, Septem- ber 1,2003,28(17) : 1564-1566.
  • 5Hung C-W , Hsu F-H, Chen S-J, et al. QTE-based Solution to Keylogger Attacks[C]//SECURWARE 2012: The Sixth Inter- national Conference on Emerging Security Information, Systems and Technologies. 2012.
  • 6Balzarotti D, Cova M, Vigna G. ClearShot: Eavesdropping on Keyboard Input from Video[C]//IEEE Symposium on Security and Privacy. 2008.
  • 7付永庆,郑莉,邵学辉.一种监听键盘录入信息的新方法[J].哈尔滨工程大学学报,2008,29(2):175-178. 被引量:3
  • 8Sagiroglu S. Keyloggers [J]. IEEE Technology and Society Ma- gazine, 2009,28(3) : 10-17.
  • 9Daniel G. keyboard encryption[J]. IEEE, 2002,21 (3) : 40-42.
  • 10Ortolani S, Giurida C, Crispo B. Bait Your Hook: A Novel Detec- tion Technique for Keyloggers[C]//RAID 2010. LNCS 6307, 2010:198-217.

二级参考文献45

  • 1邵怀宗,林静然,彭启琮,居太亮,徐异凌.基于麦克风阵列的声源定位研究[J].云南民族大学学报(自然科学版),2004,13(4):256-258. 被引量:21
  • 2严盟,廖桂生.阵列天线在近场条件下的幅相校正和阵元位置估计[J].雷达科学与技术,2005,3(6):383-386. 被引量:5
  • 3张阳.基于信息流的多安全策略操作系统架构研究[J].计算机学报,2006,29(8):1453-1459. 被引量:2
  • 4(美)Eugene Olafen 王建华 等.MFC Visual C^++技术内幕[M].北京:清华大学出版社,2000.764-765.
  • 5(美)David J 王国印.Visual C^++TM技术内幕[M].北京:清华大学出版社,1996.516-520.
  • 6[1]Bacel Rebecca, Mell2 Peter. Intrusion Detection Systems. NIST Special Publication, 2000
  • 7[2]Monrose F., Rubin A.D.. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 2000,(16): 351~359
  • 8[3]Gaines R., Lisowski W., Press S.. Authentication by keystroke timing: some preliminary results. Rand Corporation: Rand Report R-2560-NSF, 1980
  • 9[4]Leggett J., Williams G., Usnick J.. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 1991 ,(35): 859~870
  • 10[5]Napier R., Laberty W., Mahar W.. Keyboard user verification: Toward an accurate, efficient, and ecologically valid algorithm. International Journal of Human-Computer Studies, 1995,(43): 213~222

共引文献35

同被引文献28

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部