• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem

    Malware Security Evasion Techniques: An Original Keylogger Implementation

    Autor: 
    Arribas Royo, Álvaro
    ;
    Sánchez Rubio, Manuel
    ;
    Fuertes, Walter
    ;
    Callejas Cuervo, Mauro
    ;
    Estrada, Carlos Andrés
    ;
    Toulkeridis, Theofilos
    Fecha: 
    2021
    Palabra clave: 
    keylogger; malware; evasion techniques; Scopus(2)
    Revista / editorial: 
    Springer Science and Business Media Deutschland GmbH
    Tipo de Ítem: 
    conferenceObject
    URI: 
    https://reunir.unir.net/handle/123456789/12537
    DOI: 
    https://doi.org/10.1007/978-3-030-72657-7_36
    Dirección web: 
    https://link.springer.com/chapter/10.1007/978-3-030-72657-7_36
    Resumen:
    The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 10 security systems. Therefore, we considered the requirements of the malware in order to create a keylogger. Afterward, we developed a customized and unpublished malware, on which we added as many features as necessary using the Python programming language. At the end of this process, the resulting executable program will execute three main threads responsible for collecting the screenshots, keystrokes, and creating the backdoor in the infected system. Furthermore, we added the required methods to avoid the leading security tools used in Windows environments. Finally, we tested the executable file resulting on different websites as proof of concept in a real scenario. As a result, the keylogger has avoided Windows 10 firewalls, user account control, and the antivirus. Moreover, it gathered a significant amount of confidential information about user behavior, including even the credentials of the users, without noticing them.
    Mostrar el registro completo del ítem
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • Artículos Científicos WOS y SCOPUS

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    2023
    2024
    2025
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    128
    154
    193
    215
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • A Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection 

      Cazares, María Fernanda; Arévalo, Diana; Andrade, Roberto O.; Fuertes, Walter; Sánchez Rubio, Manuel (Lecture Notes in Networks and Systems, 2022)
      Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabilities. Social engineering attacks take advantage of human vulnerabilities considering that psychological factors could ...
    • Protective Factors for Developing Cognitive Skills against Cyberattacks 

      Cazares, María; Fuertes, Walter; Andrade, Roberto; Ortiz-Garcés, Iván; Sánchez Rubio, Manuel (Electronics, 2023)
      Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online platforms and shifts in their psychological ...
    • The Pathway Is Clear but the Road Remains Unpaved: a Scoping Review of Implementation of Tools for Early Detection of Cerebral Palsy 

      León Estrada, Irene; Hidalgo Robles, Álvaro; Merino Andrés, Javier; Samb Cisse, Mareme Rose; Pacheco Molero, Manuel; Gutiérrez Ortega, Mónica (Children, 2025)
      Background/Objectives: International guidelines recommend the combined use of the General Movement Assessment (GMA), Hammersmith Infant Neurological Examination (HINE), and magnetic resonance imaging (MRI) to support early ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioContacto: reunir@unir.net

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja