About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sesa 18(15): e5

Research Article

Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus

Download16230 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.15-10-2018.155740,
        author={Tim Niklas Witte},
        title={Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={5},
        number={15},
        publisher={EAI},
        journal_a={SESA},
        year={2018},
        month={10},
        keywords={Computer security, Information security, Keylogger, Malware, Security, Spyware},
        doi={10.4108/eai.15-10-2018.155740}
    }
    
  • Tim Niklas Witte
    Year: 2018
    Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus
    SESA
    EAI
    DOI: 10.4108/eai.15-10-2018.155740
Tim Niklas Witte1,*
  • 1: Institute of Computer Science, Osnabrück University, Germany
*Contact email: wittet@uni-osnabrueck.de

Abstract

Keyloggers are serious threats for computer users both private and commercial. If an attacker is capable of installing this malware on the victim’s machine then he or she is able to monitor keystrokes of a user. This keylog contains login information. As a consequence, protection and detection techniques against keyloggers become increasingly better. This article presents the method of Mouse Underlaying for creating a new kind of software based keyloggers. This method is implemented in Java for testing countermeasures concerning keylogger protection, virtual keyboard, signatures and behavior detection by anti-virus programs. Products of various manufacturers are used for demonstration purposes. All of them failed without an exception. In addition, the reasons why these products failed are analyzed, and moreover, measures against Mouse Underlaying are developed based on the demonstration results.

Keywords
Computer security, Information security, Keylogger, Malware, Security, Spyware
Received
2018-07-02
Accepted
2018-10-09
Published
2018-10-15
Publisher
EAI
http://dx.doi.org/10.4108/eai.15-10-2018.155740

Copyright © 2018 Tim Niklas Witte et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL