Skip to main content
  • 162 Accesses

Synonyms

Keystroke logging

Related Concepts

Hash Functions; Malware; Trojan

Definition

Keylogging is the malicious action whereby a third-party attacker covertly records a user’s keystrokes as they type at a computer keyboard. Keylogging has been implemented in many different ways from software programs to hardware devices to electromagnetic emissions monitoring.

Applications

Keyloggers can be deployed through a variety of methods depending on their implementation. Software keyloggers are usually deployed as a payload to some network or client-side exploit, that is, the keylogger is installed when an attacker exploits a network service with a remote exploit or is installed when a victim falls prey to an email-based social engineering attack (similar to a phishing attack). Software keyloggers have been implemented to hide themselves in a variety of different fashions. Some keyloggers hide themselves using hypervisor or virtualization techniques, some hide themselves using rootkit-style...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Hoglund G, McGraw G (2004) Exploiting software how to break code. Addison-Wesley Professional, Boston, MA

    Google Scholar 

  2. Lewis M (2008) Biologger – a biometric keylogger. Proceedings of the Black Hat Europe, Conference (2008). https://www.blackhat.com/presentations/bh-europe-08/Lewis/Whitepaper/bh-eu-08-lewis-WP.pdf

  3. Vuagnoux M, Pasini S (2009) Compromising electromagnetic emanations of wired and wireless keyboards. Proceedings of the 18th Usenix security symposium, p 1. http://www.usenix.org/events/sec09/tech/full_papers/proceedings.tgz

  4. Young A, Yung M (1997) Deniable password snatching: on the possibility of evasive electronic espionage. IEEE Symposium on Security & Privacy, May 4–7, Oakland, CA, vol. 1, pp 224–235

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Estes, A. (2011). Keylogging. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_782

Download citation

Publish with us

Policies and ethics