%0 Conference Proceedings %T Keylogger Detection Using a Decoy Keyboard %+ Western Washington University (WWU) %A Simms, Seth %A Maxwell, Margot %A Johnson, Sara %A Rrushi, Julian %Z Part 5: Secure Systems %< avec comité de lecture %( Lecture Notes in Computer Science %B 31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC) %C Philadelphia, PA, United States %Y Giovanni Livraga %Y Sencun Zhu %I Springer International Publishing %3 Data and Applications Security and Privacy XXXI %V LNCS-10359 %P 433-452 %8 2017-07-19 %D 2017 %R 10.1007/978-3-319-61176-1_24 %K Decoy I/O %K 0-knowledge anti-malware %K Kernel drivers %Z Computer Science [cs]Conference papers %X Commercial anti-malware systems currently rely on signatures or patterns learned from samples of known malware, and are unable to detect zero-day malware, rendering computers unprotected. In this paper we present a novel kernel-level technique of detecting keyloggers. Our approach operates through the use of a decoy keyboard. It uses a low-level driver to emulate and expose keystrokes modeled after actual users. We developed a statistical model of the typing profiles of real users, which regulates the times of delivery of emulated keystrokes. A kernel filter driver enables the decoy keyboard to shadow the physical keyboard, such as one single keyboard appears on the device tree at all times. That keyboard is the physical keyboard when the actual user types on it, and the decoy keyboard during time windows of user inactivity. Malware are detected in a second order fashion when data leaked by the decoy keyboard are used to access resources on the compromised machine. We tested our approach against live malware samples that we obtained from public repositories, and report the findings in the paper. The decoy keyboard is able to detect 0-day malware, and can co-exist with a real keyboard on a computer in production without causing any disruptions to the user’s work. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01684350/document %2 https://inria.hal.science/hal-01684350/file/453481_1_En_24_Chapter.pdf %L hal-01684350 %U https://inria.hal.science/hal-01684350 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-10359