[go: up one dir, main page]

MY184389A - Method and system for detecting keylogger - Google Patents

Method and system for detecting keylogger

Info

Publication number
MY184389A
MY184389A MYPI2013001813A MYPI2013001813A MY184389A MY 184389 A MY184389 A MY 184389A MY PI2013001813 A MYPI2013001813 A MY PI2013001813A MY PI2013001813 A MYPI2013001813 A MY PI2013001813A MY 184389 A MY184389 A MY 184389A
Authority
MY
Malaysia
Prior art keywords
keylogger
detecting
bait
keyboard buffer
application
Prior art date
Application number
MYPI2013001813A
Inventor
Faizal Bin Mubarak Mohd
Bin Ahmad Zaid
Firdaus Bin Mohd Rasidi Mohd
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2013001813A priority Critical patent/MY184389A/en
Priority to PCT/MY2014/000086 priority patent/WO2014185770A1/en
Publication of MY184389A publication Critical patent/MY184389A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)

Abstract

A method and system for detecting a keylogger wherein details from the system call requests (201) relating to the keyboard buffer (112) are recorded, and if any suspicious behaviour is identified through monitoring (209) the application log ( I 06) for duplication of information, the system inserts (217) a data pattern as bait into the keyboard buffer such that if the bait is duplicated by an unrelated application, the system confirms (226) that a keylogger has been detected. Figure 1
MYPI2013001813A 2013-05-17 2013-05-17 Method and system for detecting keylogger MY184389A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2013001813A MY184389A (en) 2013-05-17 2013-05-17 Method and system for detecting keylogger
PCT/MY2014/000086 WO2014185770A1 (en) 2013-05-17 2014-04-29 Method and system for detecting keylogger

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2013001813A MY184389A (en) 2013-05-17 2013-05-17 Method and system for detecting keylogger

Publications (1)

Publication Number Publication Date
MY184389A true MY184389A (en) 2021-04-01

Family

ID=50943509

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2013001813A MY184389A (en) 2013-05-17 2013-05-17 Method and system for detecting keylogger

Country Status (2)

Country Link
MY (1) MY184389A (en)
WO (1) WO2014185770A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7721333B2 (en) * 2006-01-18 2010-05-18 Webroot Software, Inc. Method and system for detecting a keylogger on a computer
US7823201B1 (en) * 2006-03-31 2010-10-26 Trend Micro, Inc. Detection of key logging software
US9130986B2 (en) * 2008-03-19 2015-09-08 Websense, Inc. Method and system for protection against information stealing software
CN101978376A (en) * 2008-03-19 2011-02-16 网圣公司 Method and system for defending against information stealing software
US8316445B2 (en) * 2008-04-23 2012-11-20 Trusted Knight Corporation System and method for protecting against malware utilizing key loggers

Also Published As

Publication number Publication date
WO2014185770A1 (en) 2014-11-20

Similar Documents

Publication Publication Date Title
CA2899201C (en) Method and system for intrusion and extrusion detection
BR112015021712A2 (en) systems and methods for discovering devices in a neighborhood aware network
WO2016178088A3 (en) Systems and methods for detecting and reacting to malicious activity in computer networks
WO2013177353A3 (en) Evaluating systems associated with wellheads
CL2012003188A1 (en) A method and system to predict a machine event for a mining machine.
MX369495B (en) Noise removal for distributed acoustic sensing data.
HK1202722A1 (en) Method for log data recording, logging server and system
GB2509874A (en) Event mining in social networks
WO2014052756A3 (en) Identifying and mitigating malicious network threats
WO2014140814A3 (en) Proof of presence via tag interactions
GB2511696A (en) Methods, systems, and computer readable media for reducing the impact of false downlink control information (DCI) detection in long term evolution (LTE)
GB2556283A (en) Defect discrimination apparatus, methods, and systems
GB201310169D0 (en) A method for attesting a plurality of data processing systems
MX2016011863A (en) Multi-string monitoring using electro-magnetic (em) corrosion detection tool.
GB201300933D0 (en) Geological log data processing methods and apparatuses
WO2014155205A3 (en) Systems and methods for communicating to a computing device information associated with the replenishment status of a retail item
WO2014150924A3 (en) Accurate typing of hla through exome sequencing
MX2017010403A (en) Bop control systems and related methods.
MX2015017319A (en) Predicting multiples in survey data.
GB2519707A (en) Method and apparatus for identifying a suspect through multiple correlated device identities
MX359528B (en) Systems and methods for monitoring a fluid system of a mining machine.
GB2519900A (en) Image instance mapping
GB2506803A (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
GB2494343A (en) Formation evaluation probe set quality and data acquisition method
WO2014117064A3 (en) System and method for detecting a compromised computing system