Autores
Acosta Bermejo Raúl
Aguirre Anaya Eleazar
Jiménez Aranda Itzael
Escamilla Ambrosio Ponciano Jorge
Título Possible Keyloggers Without Implementing a Keyboard in Android
Tipo Congreso
Sub-tipo Memoria
Descripción 13th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2017
Resumen Like the main input way to introduce information in the majority mobile devices nowadays is the screen, it is the main source where a malware could get private information. A keylogger, in this way could obtain private information. Researches of this type of malware until this moment are focused on the Android architecture application layer, leaving aside the other layers, so a keylogger could also be implemented in another layer and only use the application layer like the insertion method. An analysis of the data flow when a key is pressed on the screen is presented, from the system call by an interruption caused by hardware, the methods involved in this flow and possible generated logs and related files, performing an experimentation procedure to extract information about the keys pressed in order to determine which points can be used to get private information without the necessity of implement a third-party keyboard.
Observaciones DOI 10.1007/978-3-319-78816-6_8 Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, v. 239
Lugar Ontario
País Canada
No. de páginas 104-112
Vol. / Cap.
Inicio 2018-10-22
Fin
ISBN/ISSN 9783319788159