MY184389A - Method and system for detecting keylogger - Google Patents
Method and system for detecting keyloggerInfo
- Publication number
- MY184389A MY184389A MYPI2013001813A MYPI2013001813A MY184389A MY 184389 A MY184389 A MY 184389A MY PI2013001813 A MYPI2013001813 A MY PI2013001813A MY PI2013001813 A MYPI2013001813 A MY PI2013001813A MY 184389 A MY184389 A MY 184389A
- Authority
- MY
- Malaysia
- Prior art keywords
- keylogger
- detecting
- bait
- keyboard buffer
- application
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
A method and system for detecting a keylogger wherein details from the system call requests (201) relating to the keyboard buffer (112) are recorded, and if any suspicious behaviour is identified through monitoring (209) the application log ( I 06) for duplication of information, the system inserts (217) a data pattern as bait into the keyboard buffer such that if the bait is duplicated by an unrelated application, the system confirms (226) that a keylogger has been detected. Figure 1
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2013001813A MY184389A (en) | 2013-05-17 | 2013-05-17 | Method and system for detecting keylogger |
PCT/MY2014/000086 WO2014185770A1 (en) | 2013-05-17 | 2014-04-29 | Method and system for detecting keylogger |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2013001813A MY184389A (en) | 2013-05-17 | 2013-05-17 | Method and system for detecting keylogger |
Publications (1)
Publication Number | Publication Date |
---|---|
MY184389A true MY184389A (en) | 2021-04-01 |
Family
ID=50943509
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2013001813A MY184389A (en) | 2013-05-17 | 2013-05-17 | Method and system for detecting keylogger |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY184389A (en) |
WO (1) | WO2014185770A1 (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7721333B2 (en) * | 2006-01-18 | 2010-05-18 | Webroot Software, Inc. | Method and system for detecting a keylogger on a computer |
US7823201B1 (en) * | 2006-03-31 | 2010-10-26 | Trend Micro, Inc. | Detection of key logging software |
US9130986B2 (en) * | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
CN101978376A (en) * | 2008-03-19 | 2011-02-16 | 网圣公司 | Method and system for defending against information stealing software |
US8316445B2 (en) * | 2008-04-23 | 2012-11-20 | Trusted Knight Corporation | System and method for protecting against malware utilizing key loggers |
-
2013
- 2013-05-17 MY MYPI2013001813A patent/MY184389A/en unknown
-
2014
- 2014-04-29 WO PCT/MY2014/000086 patent/WO2014185770A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2014185770A1 (en) | 2014-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2899201C (en) | Method and system for intrusion and extrusion detection | |
BR112015021712A2 (en) | systems and methods for discovering devices in a neighborhood aware network | |
WO2016178088A3 (en) | Systems and methods for detecting and reacting to malicious activity in computer networks | |
WO2013177353A3 (en) | Evaluating systems associated with wellheads | |
CL2012003188A1 (en) | A method and system to predict a machine event for a mining machine. | |
MX369495B (en) | Noise removal for distributed acoustic sensing data. | |
HK1202722A1 (en) | Method for log data recording, logging server and system | |
GB2509874A (en) | Event mining in social networks | |
WO2014052756A3 (en) | Identifying and mitigating malicious network threats | |
WO2014140814A3 (en) | Proof of presence via tag interactions | |
GB2511696A (en) | Methods, systems, and computer readable media for reducing the impact of false downlink control information (DCI) detection in long term evolution (LTE) | |
GB2556283A (en) | Defect discrimination apparatus, methods, and systems | |
GB201310169D0 (en) | A method for attesting a plurality of data processing systems | |
MX2016011863A (en) | Multi-string monitoring using electro-magnetic (em) corrosion detection tool. | |
GB201300933D0 (en) | Geological log data processing methods and apparatuses | |
WO2014155205A3 (en) | Systems and methods for communicating to a computing device information associated with the replenishment status of a retail item | |
WO2014150924A3 (en) | Accurate typing of hla through exome sequencing | |
MX2017010403A (en) | Bop control systems and related methods. | |
MX2015017319A (en) | Predicting multiples in survey data. | |
GB2519707A (en) | Method and apparatus for identifying a suspect through multiple correlated device identities | |
MX359528B (en) | Systems and methods for monitoring a fluid system of a mining machine. | |
GB2519900A (en) | Image instance mapping | |
GB2506803A (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
GB2494343A (en) | Formation evaluation probe set quality and data acquisition method | |
WO2014117064A3 (en) | System and method for detecting a compromised computing system |