Avoid Key Logger Attacks Using Blank Virtual Onscreen Keyboard
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 125 , Downloads: 110 | CTR: 88 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016

Avoid Key Logger Attacks Using Blank Virtual Onscreen Keyboard

Jayalekshmi K S, Sunitha S

Keyloggers are hardware or software tools that record keyboard strokes. They are a threat during authentication as they can steal important information from the target computers through hidden installation. Nowadays to avoid keylogger attacks, virtual on-screen keyboards are used. But the keylogger has control over the entire Personal Computer (PC) and can read the video buffer. A novel authentication scheme is proposed using blank onscreen keyboard known as password based authentication protocol.

Keywords: Visual channel, password based authentication, smartphone, IMEI

Edition: Volume 5 Issue 7, July 2016

Pages: 1036 - 1039

Share this Article

How to Cite this Article?

Jayalekshmi K S, Sunitha S, "Avoid Key Logger Attacks Using Blank Virtual Onscreen Keyboard", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2016386, Volume 5 Issue 7, July 2016, 1036 - 1039

125 PDF Views | 110 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'password based authentication'

Views: 136 , Downloads: 100 | CTR: 74 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Views: 144 , Downloads: 109 | CTR: 76 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2530 - 2533

Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse, N. D. Kale

Share this Article

Views: 125 , Downloads: 110 | CTR: 88 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1036 - 1039

Avoid Key Logger Attacks Using Blank Virtual Onscreen Keyboard

Jayalekshmi K S, Sunitha S

Share this Article

Views: 135 , Downloads: 113 | CTR: 84 % | Weekly Popularity: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1065 - 1068

Survey Paper on Pervasive Computing for Mobile Security

Kulashree Joshi, Sulochana Sonkamble

Share this Article

Similar Articles with Keyword 'smartphone'

Views: 177 , Downloads: 68 | CTR: 38 %

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 137 - 140

Intelligent Health and Education Trust Recommendation System

Bhavin Rathod; Deepraj Sawant; Tejas Shetye; Silviya D'Monte

Share this Article

Views: 125 , Downloads: 97 | CTR: 78 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 747 - 749

A Survey of Friendbook Recommendation Services

Pankaj L. Pingate, S. M. Rokade

Share this Article

Views: 129 , Downloads: 103 | CTR: 80 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1625 - 1630

Survey on Security and Privacy Aware Location Based Service System

Sneha Sonwane, D. A. Phalke

Share this Article

Views: 111 , Downloads: 104 | CTR: 94 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2681 - 2687

Power Efficient QoS and Failover Routing in Tethernet

Kavita Sharma, Puneet Rani

Share this Article

Views: 129 , Downloads: 106 | CTR: 82 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2102 - 2104

A Survey on Improved Framework for Smart Phone using Internet of Things

Ashwini Popat Bhatkal, Bharati Kale

Share this Article
Top