Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,111,862 papers from all fields of science
Search
Sign In
Create Free Account
Hardware keylogger
Known as:
Hardware keyloggers
, KeySpyer
, Physical keylogger
Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Anti-keylogger
BIOS
Byte
Computer keyboard
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Concealed Modular Hardware Keylogger Detection Methods
Jae-kon Park
,
Sung-moon Kang
,
Goh Seung Cheol
2018
Corpus ID: 145840185
2016
2016
On The Security Evaluation of Partial Password Implementations
Theodosis Mourouzis
,
M. Wójcik
,
N. Komninos
arXiv.org
2016
Corpus ID: 17035799
A partial password is a mode of password-based authentication that is widely used, especially in the financial sector. It is…
Expand
2016
2016
Hardware-Keylogger: Die Tastatur in der Hand des Feindes
S. Vogelgesang
,
S. Hessel
,
F. Möllers
Datenschutz und Datensicherheit - DuD
2016
Corpus ID: 255352878
Hardware-Keylogger sind bereits seit Jahrzehnten bekannt — ihr Gefährdungspotential hat sich jedoch kaum verringert. Sie setzen…
Expand
2015
2015
Integration of autonomous sender for hidden log data on kleptoware for supporting physical penetration testing
Surya Michrandi Nasution
,
Yudha Purwanto
,
Agus Virgono
,
M. Tambunan
1st International Conference on Wireless and…
2015
Corpus ID: 3049419
Keylogger is a dangerous device that can capture all word that typed on the keyboard. There are two kinds of keylogger, it is…
Expand
2011
2011
Security Analysis of TrueCrypt 7 . 0 a with an Attack on the Keyfile Algorithm
2011
Corpus ID: 16033543
Preface…
Expand
2010
2010
Investigating digital fingerprints: advanced log analysis
E. Knight
Network Security
2010
Corpus ID: 206126524
2005
2005
Hardware Keylogger Detection
Andy Davis Research
,
Development Manager
2005
Corpus ID: 13914069
This paper provides an analysis of how hardware-based keyloggers work and offers suggestions as to how they may be detected. In…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required