touch interface and keylogging malware - semantic scholar€¦ · touch interface and keylogging...

Post on 14-Jun-2020

8 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Touch Interface and Keylogging Malware

IT Innovations 2015, Dubai, UAE

Cybersecurity Research LaboratoryBrigham Young University, Provo, Utah, USA

Authors

Samuel Moses Jon Mercado Allie Larson Dale Rowe

BYU Information Technology

•Cybersecurity Emphasis:•Penetration Testing•Cyber Forensics•Malware Analysis•Information Assurance

•Cybersecurity Research Laboratory•Cyber Physical Systems Security•IT Security Education•Big Data Analytics and Research•Situational Awareness

Outline

• Intro• Threat of Keyloggers• Touch Screens and Smart Cities• Testing Methodology• Findings• Future Work• Conclusion

Intro – What is a Keylogger?

• Hardware Keyloggers• Inserted between keyboard and USB port

• Software Keyloggers• Installed as programs that run in the background

Presenter
Presentation Notes
How Keyloggers work? Where the idea came from?

Keyloggers - A Serious Threat

•In 2013 keyloggers played a role in 48% of total data breaches

•In 2014 keyloggers were one of the top 10 threats•2% of POS attacks•13% Crimeware attacks•38% of data breaches

Touchscreens and Smart Cities

• Prevalence of Touchscreens increasing

• Critical Infrastructure , Public Transport, Information Kiosks

Presenter
Presentation Notes
Talk about potential Cascading Failures High Profile SCADA vulnerabilities reported Masdar City Data: Helathcare, Credit Card, PPI

Testing Methodology

Tested Keystrokes:1234567890-=

~!@#$%^&*()_+

qwertyuiop[]\

QWERTYUIOP{}|

asdfghjkl;’

ASDFGHJKL:”

zxcvbnm,./

ZXCVBNM<>?

<ctrl>

The quick brown fox jumped over the lazy dog

The quick red<backspace><backspace><backspace>

Tested Keyloggers:•Actual Keylogger•Metasploit Javascript Keylogger•Free Keylogger•Meterpreter Keylogger•Spyrix Keylogger•KeyGrabber Physical Keylogger

Touchscreen FindingsKeylogger 100% Keystroke

CoverageEnter &

Backspace Only0% Keystroke

CoverageActual Keylogger X

Metasploit JavascriptKeylogger

X

Free Keylogger X

Meterpreter Keylogger X

Spyrix Keylogger X

KeyGrabber Physical Keylogger

X

Future Work

• Determining Risk to current and future systems• Review source code of keyloggers

• Most effective touchscreen keylogger attack vectors

• Securing Critical Infrastructure

Presenter
Presentation Notes
Planning for new technologies -how to stop it from getting there -how to monitor it being there -controls to practice security in depth

Conclusion

• Keyloggers are still a threat today and are a threat to smart cities infrastructure

• Adjusting for these security vulnerabilities in the beginning stages of a smart city’s development will more effectively mitigate the risk

Questions?• Contact us at csrl@byu.edu

• https://cybersecurity.byu.edu/research/keyloggers

top related