A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them

Keyloggers and screenloggers are one of the active growing threats to user’s confidentiality as they can run in user-space, easily be distributed and upload information to remote servers. They use a wide number of different techniques and may be implemented in many ways. Keyloggers and screenloggers are very largely diverted from their primary and legitimate function to be exploited for malicious purposes compromising the privacy of users, and bank customers notably. This paper presents a survey of keylogger and screenlogger attacks to increase the understanding and awareness of their threat by covering basic concepts related to bank information systems and explaining their functioning, as it presents and discusses an extensive set of plausible countermeasures.

[1]  Ryan M. Gerdes,et al.  Physical-Layer Detection of Hardware Keyloggers , 2015, RAID.

[2]  Soumya K. Ghosh,et al.  Optical Character Recognition Systems , 2017 .

[3]  Ajinkya Pawar,et al.  Secure Authentication using Anti-Screenshot Virtual Keyboard , 2011 .

[4]  M. Nasipuri,et al.  Text line extraction from handwritten document pages using spiral run length smearing algorithm , 2012, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS).

[5]  Abdel Belaïd,et al.  Impact of features and classifiers combinations on the performances of Arabic recognition systems , 2017, 2017 1st International Workshop on Arabic Script Analysis and Recognition (ASAR).

[6]  Sonal Chawla,et al.  Image Compression Techniques: A Review , 2014 .

[7]  Puneet Verma,et al.  Designing of Licensed Number Plate Recognition system using hybrid technique from neural network & template matching , 2015, 2015 International Conference on Computing, Communication and Security (ICCCS).

[8]  Mayank Agarwal,et al.  Secure authentication using dynamic virtual keyboard layout , 2011, ICWET.

[9]  Ahmad Abdulkader,et al.  Low Cost Correction of OCR Errors Using Learning in a Multi-Engine Environment , 2009, 2009 10th International Conference on Document Analysis and Recognition.

[10]  Johnny Lim Defeat spyware with anti-screen capture technology using visual persistence , 2007, SOUPS '07.

[11]  Ming-Wen Chang,et al.  Optical chinese character recognition with a hidden Markov model classifier—a novel approach , 1990 .

[12]  Alekha Kumar Mishra,et al.  Optical character recognition using artificial neural network , 2017, 2017 International Conference on Computer Communication and Informatics (ICCCI).

[13]  Edison A. Roxas,et al.  Recognition of handwritten alphanumeric characters using Projection Histogram and Support Vector Machine , 2015, 2015 International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM).

[14]  Tong Lu,et al.  Character Segmentation and Recognition , 2014 .

[15]  Samer El-Sawda,et al.  Phishing attacks and solutions , 2007, Mobimedia 2007.

[16]  Gilles Grimaud,et al.  Virtual Keyboard Logging Counter-Measures Using Human Vision Properties , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[17]  Georgios Kambourakis,et al.  From keyloggers to touchloggers: Take the rough with the smooth , 2013, Comput. Secur..