TY - GEN
T1 - Possible keyloggers without implementing a keyboard in android
AU - Jiménez Aranda, Itzael
AU - Aguirre Anaya, Eleazar
AU - Acosta Bermejo, Raúl
AU - Escamilla Ambrosio, Ponciano Jorge
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018.
PY - 2018
Y1 - 2018
N2 - Like the main input way to introduce information in the majority mobile devices nowadays is the screen, it is the main source where a malware could get private information. A keylogger, in this way could obtain private information. Researches of this type of malware until this moment are focused on the Android architecture application layer, leaving aside the other layers, so a keylogger could also be implemented in another layer and only use the application layer like the insertion method. An analysis of the data flow when a key is pressed on the screen is presented, from the system call by an interruption caused by hardware, the methods involved in this flow and possible generated logs and related files, performing an experimentation procedure to extract information about the keys pressed in order to determine which points can be used to get private information without the necessity of implement a third-party keyboard.
AB - Like the main input way to introduce information in the majority mobile devices nowadays is the screen, it is the main source where a malware could get private information. A keylogger, in this way could obtain private information. Researches of this type of malware until this moment are focused on the Android architecture application layer, leaving aside the other layers, so a keylogger could also be implemented in another layer and only use the application layer like the insertion method. An analysis of the data flow when a key is pressed on the screen is presented, from the system call by an interruption caused by hardware, the methods involved in this flow and possible generated logs and related files, performing an experimentation procedure to extract information about the keys pressed in order to determine which points can be used to get private information without the necessity of implement a third-party keyboard.
KW - Android keylogger
KW - Keylogger
KW - Malware
KW - Touchlogger
KW - Touchscreen
UR - http://www.scopus.com/inward/record.url?scp=85046553618&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-78816-6_8
DO - 10.1007/978-3-319-78816-6_8
M3 - Contribución a la conferencia
SN - 9783319788159
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 104
EP - 112
BT - Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Proceedings
A2 - Ghorbani, Ali
A2 - Ren, Kui
A2 - Zhu, Sencun
A2 - Zhang, Aiqing
A2 - Lin, Xiaodong
PB - Springer Verlag
T2 - 13th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2017
Y2 - 22 October 2017 through 25 October 2017
ER -