@inproceedings{44164397f23f428abb8e3141cbabee1a,
title = "Defend a system against keyloggers with a privilege-limited account",
abstract = "Nowadays keystroke logging is one of the most widespread threats used for password theft. In this paper, rather than detecting existing malware or creating a trusted tunnel in the kernel, we present a method called Broker to protect the password that a user provides for a web page to login to a web service. Installing such solutions in a host only requires limited privileges of related computers. The Broker method uses a second device and the Broker server to safely transfer users' account-related information. Comparing with previous work, the Broker method successfully separates user names and passwords so that even a second device and the Broker server are compromised, users still will not leak their private information to attackers. Finally, the Broker method can be applied to all websites without any modification of them.",
keywords = "Authentication, Computer security, Keylogger, Privacy",
author = "Hung, {Chien Wei} and Hsu, {Fu Hau} and Chen, {Shih Jen} and Hwang, {Yan Ling} and Tso, {Chang Kuo} and Hsu, {Li Pin}",
year = "2013",
doi = "10.4028/www.scientific.net/AMM.284-287.3385",
language = "???core.languages.en_GB???",
isbn = "9783037856123",
series = "Applied Mechanics and Materials",
pages = "3385--3389",
booktitle = "Innovation for Applied Science and Technology",
note = "2nd International Conference on Engineering and Technology Innovation 2012, ICETI 2012 ; Conference date: 02-11-2012 Through 06-11-2012",
}