Computing and Information Technology

David and Goliath: Arming the user with a sling against keyloggers


Listen Later

Software loggers are a prominent class of privacy-breaching software often used to harvest confidential information. Kaspersky Lab’s Stefano Ortolani shows that it is possible to model the behaviour of a keylogger and trigger it upon request in a well-defined manner. Leveraging this property, he presents a detection technique to identify it among running processes.
The presentation was delivered at Secure South West, held at Plymouth University on 16 December 2013.
[(CC) BY-NC-SA 2.0 UK]
...more
View all episodesView all episodes
Download on the App Store

Computing and Information TechnologyBy Plymouth University