Mostrar el registro sencillo del ítem
Malware Security Evasion Techniques: An Original Keylogger Implementation
dc.contributor.author | Arribas Royo, Álvaro | |
dc.contributor.author | Sánchez Rubio, Manuel | |
dc.contributor.author | Fuertes, Walter | |
dc.contributor.author | Callejas Cuervo, Mauro | |
dc.contributor.author | Estrada, Carlos Andrés | |
dc.contributor.author | Toulkeridis, Theofilos | |
dc.date | 2021 | |
dc.date.accessioned | 2022-03-01T08:44:57Z | |
dc.date.available | 2022-03-01T08:44:57Z | |
dc.identifier.isbn | 9783030726560 | |
dc.identifier.issn | 21945357 | |
dc.identifier.uri | https://reunir.unir.net/handle/123456789/12537 | |
dc.description.abstract | The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 10 security systems. Therefore, we considered the requirements of the malware in order to create a keylogger. Afterward, we developed a customized and unpublished malware, on which we added as many features as necessary using the Python programming language. At the end of this process, the resulting executable program will execute three main threads responsible for collecting the screenshots, keystrokes, and creating the backdoor in the infected system. Furthermore, we added the required methods to avoid the leading security tools used in Windows environments. Finally, we tested the executable file resulting on different websites as proof of concept in a real scenario. As a result, the keylogger has avoided Windows 10 firewalls, user account control, and the antivirus. Moreover, it gathered a significant amount of confidential information about user behavior, including even the credentials of the users, without noticing them. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | Springer Science and Business Media Deutschland GmbH | es_ES |
dc.relation.ispartofseries | ;vol. 1365 | |
dc.relation.uri | https://link.springer.com/chapter/10.1007/978-3-030-72657-7_36 | es_ES |
dc.rights | restrictedAccess | es_ES |
dc.subject | keylogger | es_ES |
dc.subject | malware | es_ES |
dc.subject | evasion techniques | es_ES |
dc.subject | Scopus(2) | es_ES |
dc.title | Malware Security Evasion Techniques: An Original Keylogger Implementation | es_ES |
dc.type | conferenceObject | es_ES |
reunir.tag | ~ARI | es_ES |
dc.identifier.doi | https://doi.org/10.1007/978-3-030-72657-7_36 |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |