Software loggers are a prominent class of privacy-breaching software often used to harvest confidential information. Kaspersky Lab’s Stefano Ortolani shows that it is possible to model the behaviour of a keylogger and trigger it upon request in a well-defined manner. Leveraging this property, he presents a detection technique to identify it among running processes.
The presentation was delivered at Secure South West, held at Plymouth University on 16 December 2013.
[(CC) BY-NC-SA 2.0 UK]