NoisyKey: Tolerating Keyloggers via Keystrokes Hiding
Date: August 2012
Publication: Proceedings of the 7th USENIX Workshop on Hot Topics in Security, HotSec '12
Source 1: https://www.usenix.org/system/files/conference/hotsec12/hotsec12-final5.pdf
Keyloggers are a prominent class of malicious software that surreptitiously logs all the user activity. Traditional approaches aim to eradicate this threat by either preventing or detecting their deployment. In this paper, we take a new perspective to this problem: we explore the possibility of tolerating the presence of a keylogger, while making no assumption on the keylogger internals or the system state. The key idea is to confine the user keystrokes in a noisy event channel flooded with artificially generated activity. Our technique allows legitimate applications to transparently recover the original user keystrokes, while any deployed keylogger is exposed to a stream of data statistically indistinguishable from random noise. We evaluate our solution in realistic settings and prove the soundness of our noise model. We also verify that the overhead introduced is acceptable and has no significant impact on the user experience.
PasswordResearch.com Note: Presentation video and audio: https://www.usenix.org/conference/hotsec12/noisykey-tolerating-keyloggers-keystrokes-hiding
Do you have additional information to contribute regarding this research paper? If so, please email email@example.com with the details.