Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard,[1][2] typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.
While the programs themselves are legal,[3] with many designed to allow employers to oversee the use of their computers, keyloggers are most often used for stealing passwords and other confidential information.[4][5] Keystroke logging can also be utilized to monitor activities of children in schools or at home and by law enforcement officials to investigate malicious usage.[6]
Keylogging can also be used to study keystroke dynamics[7] or human-computer interaction. Numerous keylogging methods exist, ranging from hardware and software-based approaches to acoustic cryptanalysis.
^Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). "Early prediction of writing quality using keystroke logging". International Journal of Artificial Intelligence in Education. 32 (4): 835–866. doi:10.1007/s40593-021-00268-w. hdl:10067/1801420151162165141. ISSN 1560-4292. S2CID 238703970.
^Use of legal software products for computer monitoring, keylogger.org
^"Keylogger". Oxford dictionaries. Archived from the original on 2013-09-11. Retrieved 2013-08-03.
^Keyloggers: How they work and how to detect them (Part 1), Secure List, "Today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose."
^Rai, Swarnima; Choubey, Vaaruni; Suryansh; Garg, Puneet (2022-07-08). "A Systematic Review of Encryption and Keylogging for Computer System Security". 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT). IEEE. pp. 157–163. doi:10.1109/CCiCT56684.2022.00039. ISBN 978-1-6654-7224-1. S2CID 252849669.
^Stefan, Deian, Xiaokui Shu, and Danfeng Daphne Yao. "Robustness of keystroke-dynamics based biometrics against synthetic forgeries." computers & security 31.1 (2012): 109-121.
Keystrokelogging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically...
purpose of logging keys typed by the user. Microsoft wireless keyboards 2011 and earlier are documented to have this vulnerability. Keystrokelogging (often...
have this vulnerability. Keystrokelogging (often called keylogging) is a method of capturing and recording user keystrokes. While it can be used legally...
keystrokelogging systems do not explain reasons for pauses or deletion of texts, it allows attackers to analyze text information. Keystrokelogging can...
Hardware keyloggers are used for keystrokelogging, a method of capturing and recording computer users' keystrokes, including sensitive passwords. They...
monitoring tool launched by the owners of Staff.com in 2012. It includes keystrokelogging, screenshot and internet usage tracking features. A multi-functional...
surveillance disclosures (2013–present) Katz v. United States (1967) Keystrokelogging Listening station Magic (cryptography) Man-in-the-middle attack Mass...
Explorer on Microsoft Windows operating systems. This malware uses keystrokelogging and form grabbing to steal user credentials for malicious use. SpyEye...
Clifford Stoll, a scientist working as a system administrator, found ways to log the attacks and to trace them back (with the help of many others). 23, a...
partial password is a mode of password authentication intended to make keystrokelogging and shoulder surfing less effective. By asking the user to enter only...
iPhone and 3G iPads were "logging where the user visits". Apple released a statement saying that the iPad and iPhone were only logging the towers that the phone...
recognition. Data needed to analyze keystroke dynamics is obtained by keystrokelogging. The behavioral biometric of Keystroke Dynamics uses the manner and rhythm...
describe any self-propagating program. Keystrokelogging A keylogger is a tool designed to record ("log") every keystroke on an affected machine for later retrieval...
was the output when it understood the file. K&R would remember. The keystrokelogging software used by the NSA for its remote intelligence gathering operations...
login page, then proceeds to inject malicious code into the page, keystrokelogging the computer user's details. December: Linux.Darlloz targets the Internet...
an automatic log for analysis by the company. Key logging, or keystrokelogging, is a process that records a user's typing. Key logging software may also...
activities on the remote computer. Examples of its capabilities: KeystrokeloggingKeystroke injection Screen captures Program launching File browsing Shutting...
use of security questions online, they are rendered vulnerable to keystrokelogging and brute-force guessing attacks, as well as phishing. In addition...
E.; Sullivan, K., eds. (2019). Observing Writing: Insights from KeystrokeLogging and Handwriting. Leiden, The Netherlands: Brill. ISBN 978-90-04-39251-9...