Skip to main content

Security Assessment of Keyboard Data Based on Kaspersky Product

  • Conference paper
  • First Online:
Advances on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2016)

Abstract

To protect keyboard data that includes sensitive information such as authentication data, secure keyboard programs preempt the extraction of the keyboard data before they are stolen by an attacker. Although these programs are operated at a variety of defense levels, some secure keyboard programs are still vulnerable to hardware-level attacks; therefore, in this paper, the security of keyboard data is evaluated according to the functionality of the Kaspersky “Internet Security” product, whereby secure information is inputted into a variety of websites that comprises SNSs, an email account, and a banking service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baig, Muzammil M., and Wasim Mahmood. “A robust technique of anti key-logging using key logging mechanism.” 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference. IEEE, 2007

    Google Scholar 

  2. Kyungroul Lee, and Kangbin Yim “Keyboard Security: A Technological Review” IMIS (Innovative Mobile and Internet Services in Ubiquitous Computing), pp.9-15, Jun. 2011.

    Google Scholar 

  3. “Intel Architechtur Software Developer’s Manual Vol.3 System Programming”, Intel Corpration, 1999

    Google Scholar 

  4. Susan Wiedenbeck, et al., “PassPoints: design and longitudinal ebaluation of a graphicl password system” International Journal of Human- Computer Studies, v.63 n.1-2, p.102-127, July 2005

    Google Scholar 

  5. Sanchez, “IBM PC/AT Technical Reference Manual”, IBM Corporation, 1985

    Google Scholar 

  6. Kaspersky Lab, http://usa.kaspersky.com

  7. Taeyoung Jung, Kangbin Yim, “Countermeasures to the Vulnerability of the Keyboard Hardware,” Journal of the Korea Information Security and Cryptology, Vol. 18, No. 4, pp.187-194, Aug., 2008

    Google Scholar 

  8. Kyungroul Lee, Kangbin Yim et al., “Password Sniff by Forcing the Keyboard to Replay Scan Codes,” Proceedings of JWIS 2010, PP.9-11, Aug. 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lee, S., Lee, K., Yim, K. (2017). Security Assessment of Keyboard Data Based on Kaspersky Product. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49106-6_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49105-9

  • Online ISBN: 978-3-319-49106-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics