Malware Security Evasion Techniques: An Original Keylogger Implementation

dc.contributor.authorArribas Royo, Álvaro
dc.contributor.authorSánchez Rubio, Manuel
dc.contributor.authorFuertes, Walter
dc.contributor.authorCallejas Cuervo, Mauro
dc.contributor.authorEstrada, Carlos Andrés
dc.contributor.authorToulkeridis, Theofilos
dc.date2021
dc.date.accessioned2022-03-01T08:44:57Z
dc.date.available2022-03-01T08:44:57Z
dc.description.abstractThe current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 10 security systems. Therefore, we considered the requirements of the malware in order to create a keylogger. Afterward, we developed a customized and unpublished malware, on which we added as many features as necessary using the Python programming language. At the end of this process, the resulting executable program will execute three main threads responsible for collecting the screenshots, keystrokes, and creating the backdoor in the infected system. Furthermore, we added the required methods to avoid the leading security tools used in Windows environments. Finally, we tested the executable file resulting on different websites as proof of concept in a real scenario. As a result, the keylogger has avoided Windows 10 firewalls, user account control, and the antivirus. Moreover, it gathered a significant amount of confidential information about user behavior, including even the credentials of the users, without noticing them.es_ES
dc.identifier.doihttps://doi.org/10.1007/978-3-030-72657-7_36
dc.identifier.isbn9783030726560
dc.identifier.issn21945357
dc.identifier.urihttps://reunir.unir.net/handle/123456789/12537
dc.language.isoenges_ES
dc.publisherSpringer Science and Business Media Deutschland GmbHes_ES
dc.relation.ispartofseries;vol. 1365
dc.relation.urihttps://link.springer.com/chapter/10.1007/978-3-030-72657-7_36es_ES
dc.rightsrestrictedAccesses_ES
dc.subjectkeyloggeres_ES
dc.subjectmalwarees_ES
dc.subjectevasion techniqueses_ES
dc.subjectScopus(2)es_ES
dc.titleMalware Security Evasion Techniques: An Original Keylogger Implementationes_ES
dc.typeconferenceObjectes_ES
opencost.publication.doihttps://doi.org/10.1007/978-3-030-72657-7_36
reunir.tag~ARIes_ES

Archivos

Bloque de licencias

Mostrando 1 - 1 de 1
Cargando...
Nombre:
license.txt
Tamaño:
1.27 KB
Formato:
Item-specific license agreed upon to submission
Descripción: