Open Access   Article Go Back

Foiling Keylogger Attacks using Virtual Onscreen Keyboard

Jayalekshmi K.S1

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 635-639, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.635639

Online published on Feb 28, 2019

Copyright © Jayalekshmi K.S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jayalekshmi K.S, “Foiling Keylogger Attacks using Virtual Onscreen Keyboard,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.635-639, 2019.

MLA Style Citation: Jayalekshmi K.S "Foiling Keylogger Attacks using Virtual Onscreen Keyboard." International Journal of Computer Sciences and Engineering 7.2 (2019): 635-639.

APA Style Citation: Jayalekshmi K.S, (2019). Foiling Keylogger Attacks using Virtual Onscreen Keyboard. International Journal of Computer Sciences and Engineering, 7(2), 635-639.

BibTex Style Citation:
@article{K.S_2019,
author = {Jayalekshmi K.S},
title = {Foiling Keylogger Attacks using Virtual Onscreen Keyboard},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {635-639},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3717},
doi = {https://doi.org/10.26438/ijcse/v7i2.635639}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.635639}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3717
TI - Foiling Keylogger Attacks using Virtual Onscreen Keyboard
T2 - International Journal of Computer Sciences and Engineering
AU - Jayalekshmi K.S
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 635-639
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
343 196 downloads 97 downloads
  
  
           

Abstract

Keyloggers are hardware or software tools designed to record user’s keyboard strokes. They are a threat during authentication as they can capture important information from the target computers through secret installation. They are largely undetected by most anti-virus software. To prevent key logger attacks, virtual on-screen keyboard with random keyboard arrangement is used. Unfortunately, the key loggers have improved tremendously. They take control of the personal computer and can capture every event and read the video buffer. By using cryptographically strong keys and passwords information can be delivered securely to the user’s computer. But humans may not have sufficient memory to remember cryptographically strong keys. This can be solved by introducing an intermediate device that bridges humans and user terminal. The proposed authentication scheme is a password-based authentication method using a randomized onscreen keyboard. The scheme utilizes a smartphone as the intermediate device which contains the keys required for decryption. The encrypted contents are encoded into QR (Quick Response) codes. QR codes can be scanned using the smartphone. The user owns a user id and a password. The user terminal will display a blank keyboard and the QR code which carries the encrypted random permutation of keyboard arrangement. The QR code will be decoded using the intermediate device. Looking at the keyboard arrangement in the intermediate device the user needs to click the buttons on the blank keyboard to input the password. The use of IMEI (International Mobile Equipment Identity) of the smartphone prevents the attackers from using any other phones for authentication even if he knows the user-id, password and the key for decryption.

Key-Words / Index Term

QR code, password based authentication, smartphone, IMEI

References

[1] Seref Sagiroglu and Gurol Canbek, “Key loggers –Increasing threats to Computer Society and Privacy” IEEE TECHNOLOGY AND SOCIETY MAGAZINE | FALL 2009.
[2] Reza Jalili, “Secure Data Entry and Visual Authentication System and Method”, U.S Patent Appl No: 08/980,748, March 27 2001.
[3] Timothy William Cooper, “System and login resistance to compromise”, U.S Patent Appl No:12/070 627, June 2011
[4] Ramarao Pemmaraju, “Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser” U.S Patent, Appl. No: 11/656,236, August 2007
[5] Stuart P. Goring, Joseph R. Rabaiotti and Antonia J. Jones,” Anti-key logging measures for secure Internet login: an example of the law of unintended consequences”, Computers and Security, February 2007
[6] McCune, J.M., Perrig, A. and Reiter, M.K. (2009)‘Seeing-Is-Believing: using camera phones for human- verifiable authentication’, Int. J. Security and Networks, Vol. 4, Nos. 1/2, pp.43–56
[7] DaeHun Nyang, Aziz Mohaisen, Jeonil Kang,” Key Logging-Resistant Visual Authentication Protocols” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.13, NO. 11, NOVEMBER 2014