Skip to main content

Types of Keyloggers Technologies – Survey

  • Conference paper
  • First Online:
ICCCE 2020

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 698))

Abstract

Keyloggers are rootkit malware that record the keystrokes of the victim’s system and log it into the attacker’s system. It can be used to capture sensitive data like passwords, PINs, usernames, some kind of confidential messages shared between two entities etc. We would be explaining different types of keyloggers and their working. We have also explained the different applications and measures needed to avoid keylogging activities on your system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rajendra RK, CA Wood (2010) Keylogger in Cybersecurtiy Education. Rechester Institute of Technology, Rechester, New York, USA

    Google Scholar 

  2. Olzak T (2008) Keystroke Logging Keylogging Erudio Security, LLC

    Google Scholar 

  3. Ysterud SA (2014) Keylogging of user interaction in physical and virtual environments and its implications for honeypot analysis

    Google Scholar 

  4. Ahmed YA, Maarof MA, Hassan FM, Abshir MM (2014) Computer Science, Faculty of Computer Science & Information Systems, Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia

    Google Scholar 

  5. Davis A (2007) Hardware keylogger Detection. Smith Square London

    Google Scholar 

  6. https://en.wikipedia.org/wiki/Hardware_keylogger

  7. https://en.wikipedia.org/wiki/Keystroke_logging#cite_note-1

  8. By Caleb Chen, 20 March 2017. https://www.privateinternetaccess.com/blog/2017/03/microsoft-windows-10-keylogger-enableddefault-heres-disable/

  9. Prabanand SC, Prathap C, Vignesh LS, Solairaj A, Mathalairaj J (2016) Keyloggers Software Detection Techniques

    Google Scholar 

  10. “Hypervisor” Wikipedia

    Google Scholar 

  11. “Kadix” keylogging Ontology

    Google Scholar 

  12. https://en.wikipedia.org/wiki/Blue_Pill_(softwaRe)

  13. https://pdfs.semanticscholar.org/37ea/54247bb3bedd356f5171ee5f8e1a83662dfc.pdf

  14. http://www.symantec.com/avcenter/reference/the.evolution.of.malicious.irc.bots.pdf

  15. https://arxiv.org/abs/1405.3760

  16. https://www.google.com/url?sa=t&source=web&rct=j. http://www.keyloggerpro.com/uses.php

  17. Zico Kolter J, Maloof MA (2006) Learning to Detect and Classify Malicious Executables in the wild

    Google Scholar 

  18. http://techsohail.blogspot.com/2012/05/beware-ofhardware-keylogger-hardware_04.html

  19. Obiniyi AA, Umar MA (2013) Random number based dynamic antiscreenshot virtual keyboard for securer web login. Int J Eng Sci 2

    Google Scholar 

  20. Wazid M, Katal A, Goudar RH, Singh DP, Tyagi A, Sharma R, Bhakuni P (2013) A framework for detection and prevention of novel keylogger spyware attacks. In: 7th international conference on intelligent systems and control (ISCO 2013)

    Google Scholar 

  21. ATM Skimming Devices are Still a Big Problem. https://coastalheritagebank.com/2016/05/13/atmskimming-devices-are-still-a-big-problem/

  22. https://krebsonsecurity.com/2011/04/spyeyetargets-opera-google-chrome-users/

  23. https://securelist.com/keyloggers-how-theywork-and-how-to-detect-them-part-1/36138/

  24. Keyboard overlay image. https://coastalheritagebank.com/2016/05/13/atmskimming-devices-are-still-a-big-problem/

  25. Doja MN, Naveen Kumar (2008) Image authentication schemes against key-logger spyware. In: 9th ACM ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing 2008 (SNPD 2008)

    Google Scholar 

  26. Acoustic Keylogger. https://www.google.co.in/url?sa=t&source=web&rct=jhttps://www.comparitech.com/blog/vpnprivacy/what-is-keylogger

  27. Anti Keylogger. https://en.m.wikipedia.org/wiki/Anti-keylogger

  28. http://www.cryptomuseum.com/covert/bugs/selectric/index.htm

  29. Fu J, Yang H, Liang Y, Tan C (2014) Enhancing keylogger detection performance of the dendritic cell algorithm by an enticement strategy

    Google Scholar 

  30. Wood CA, Raj RK (2010) Keyloggers in Cybersecurity Education, New York, USA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tuscano, A., Koshy, T.S. (2021). Types of Keyloggers Technologies – Survey. In: Kumar, A., Mozar, S. (eds) ICCCE 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. https://doi.org/10.1007/978-981-15-7961-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7961-5_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7960-8

  • Online ISBN: 978-981-15-7961-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics