Abstract
This research paper aims to build and explore a Linux kernel module capable of logging keystrokes that a user would make on a Linux-based system. The module captures credentials which is a process known as keylogging. The kernel of the operating system manages all resources and data, and a breach in this area is a serious information security risk. This paper provides substantial evidence that kernel-level keyloggers are a very serious risk to information security in operating systems and computer systems in general. Such keyloggers can log user information, such as passwords, usernames and other information without much of the user’s knowledge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ruhani, A.B.B., Zolkipli, M.F.: Keylogger: the unsung hacking weapon. Borneo Int. J. 6(1), 33–43 (2023). eISSN 2636-9826
Sullivan, K., Lindgren, E. (eds.): Computer Key-Stroke Logging and Writing, vol. 18. Brill (2021)
Zeng, L., Xiao, Y., Chen, H.: Linux auditing: overhead and adaptation. In: 2015 IEEE International Conference on Communications (ICC), pp. 7168–7173. IEEE, June 2015
Bassil, Y.: Windows and Linux operating systems from a security perspective. arXiv preprint arXiv:1204.0197 (2012)
Le, D., Yue, C., Smart, T., Wang, H.: College of William & Mary, Department of Computer Science, Williamsburg, VA, Technical report. WM-CS-2008-05 (2008)
Wood, C., Raj, R.: Keyloggers in cybersecurity education. In: Security and Management, pp. 293–299, July 2010
Sun, R., Bishop, M., Ebner, N.C., Oliveira, D., Porter, D.E.: The case for unpredictability and deception as OS features. USENIX (2015)
Srivastava, A., Singh, K., Giffin, J.: Secure observation of kernel behavior. Georgia Institute of Technology Report (2008)
Singh, A., Choudhary, P.: Keylogger detection and prevention. J. Phys. Conf. Ser. 2007(1), 012005 (2021)
Prajapati, V., Kalsariya, R., Dubey, A., Mehta, K., Patil, M.: Analysis of keyloggers in cybersecurity. Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET) 8(10), 466–474 (2020)
Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hassett, L., Ogwok, D. (2025). Linux Kernel Keyloggers and Information Security. In: Clarke, N., Furnell, S. (eds) Human Aspects of Information Security and Assurance. HAISA 2024. IFIP Advances in Information and Communication Technology, vol 721. Springer, Cham. https://doi.org/10.1007/978-3-031-72559-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-72559-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-72558-6
Online ISBN: 978-3-031-72559-3
eBook Packages: Computer ScienceComputer Science (R0)