Skip to main content

Linux Kernel Keyloggers and Information Security

  • Conference paper
  • First Online:
Human Aspects of Information Security and Assurance (HAISA 2024)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 721))

  • 76 Accesses

Abstract

This research paper aims to build and explore a Linux kernel module capable of logging keystrokes that a user would make on a Linux-based system. The module captures credentials which is a process known as keylogging. The kernel of the operating system manages all resources and data, and a breach in this area is a serious information security risk. This paper provides substantial evidence that kernel-level keyloggers are a very serious risk to information security in operating systems and computer systems in general. Such keyloggers can log user information, such as passwords, usernames and other information without much of the user’s knowledge.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ruhani, A.B.B., Zolkipli, M.F.: Keylogger: the unsung hacking weapon. Borneo Int. J. 6(1), 33–43 (2023). eISSN 2636-9826

    Google Scholar 

  2. Sullivan, K., Lindgren, E. (eds.): Computer Key-Stroke Logging and Writing, vol. 18. Brill (2021)

    Google Scholar 

  3. Zeng, L., Xiao, Y., Chen, H.: Linux auditing: overhead and adaptation. In: 2015 IEEE International Conference on Communications (ICC), pp. 7168–7173. IEEE, June 2015

    Google Scholar 

  4. Bassil, Y.: Windows and Linux operating systems from a security perspective. arXiv preprint arXiv:1204.0197 (2012)

  5. Le, D., Yue, C., Smart, T., Wang, H.: College of William & Mary, Department of Computer Science, Williamsburg, VA, Technical report. WM-CS-2008-05 (2008)

    Google Scholar 

  6. Wood, C., Raj, R.: Keyloggers in cybersecurity education. In: Security and Management, pp. 293–299, July 2010

    Google Scholar 

  7. Sun, R., Bishop, M., Ebner, N.C., Oliveira, D., Porter, D.E.: The case for unpredictability and deception as OS features. USENIX (2015)

    Google Scholar 

  8. Srivastava, A., Singh, K., Giffin, J.: Secure observation of kernel behavior. Georgia Institute of Technology Report (2008)

    Google Scholar 

  9. Singh, A., Choudhary, P.: Keylogger detection and prevention. J. Phys. Conf. Ser. 2007(1), 012005 (2021)

    Google Scholar 

  10. Prajapati, V., Kalsariya, R., Dubey, A., Mehta, K., Patil, M.: Analysis of keyloggers in cybersecurity. Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET) 8(10), 466–474 (2020)

    Article  Google Scholar 

  11. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Ogwok .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hassett, L., Ogwok, D. (2025). Linux Kernel Keyloggers and Information Security. In: Clarke, N., Furnell, S. (eds) Human Aspects of Information Security and Assurance. HAISA 2024. IFIP Advances in Information and Communication Technology, vol 721. Springer, Cham. https://doi.org/10.1007/978-3-031-72559-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-72559-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-72558-6

  • Online ISBN: 978-3-031-72559-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics