Delgado, B. and Karavanic, K. L. (2018). EPA-RIMM: A
framework for dynamic smm-based runtime integrity
measurement. CoRR, abs/1805.03755.
Embleton, S., Sparks, S., and Zou, C. (2008). Smm rootk-
its: A new breed of os independent malware. In Pro-
ceedings of the 4th International Conference on Se-
curity and Privacy in Communication Netowrks, Se-
cureComm ’08, pages 11:1–11:12, New York, NY,
USA. ACM.
Florencio, D. and Herley, C. (2007). A large-scale study
of web password habits. In Proceedings of the 16th
International Conference on World Wide Web, WWW
’07, pages 657–666, New York, NY, USA. ACM.
Herley, C. (2009). So long, and no thanks for the externali-
ties: The rational rejection of security advice by users.
In Proceedings of the 2009 Workshop on New Secu-
rity Paradigms Workshop, NSPW ’09, pages 133–144,
New York, NY, USA. ACM.
Holz, T., Engelberth, M., and Freiling, F. (2009). Learning
more about the underground economy: A case-study
of keyloggers and dropzones. In Proceedings of the
14th European Conference on Research in Computer
Security, ESORICS’09, pages 1–18, Berlin, Heidel-
berg. Springer-Verlag.
Jacob, R. J. K. (1996). Human-computer interaction: Input
devices. ACM Comput. Surv., 28(1):177–179.
Juels, A. and Rivest, R. L. (2013). Honeywords: Making
password-cracking detectable. In Proceedings of the
2013 ACM SIGSAC Conference on Computer ; Com-
munications Security, CCS ’13, pages 145–160, New
York, NY, USA. ACM.
Ladakis, E., Koromilas, L., Vasiliadis, G., Polychronakis,
M., and Ioannidis, S. (2013). You can type , but you
can ’ t hide : A stealthy gpu-based keylogger.
Liang, H., Li, M., Zhang, Q., Yu, Y., Jiang, L., and Chen,
Y. (2018). Aurora: Providing trusted system ser-
vices for enclaves on an untrusted system. CoRR,
abs/1802.03530.
Mike (2009). Operating systems development - keyboard.
Ortolani, S. and Crispo, B. (2012). Noisykey: Tolerating
keyloggers via keystrokes hiding. In Proceedings of
the 7th USENIX Conference on Hot Topics in Security,
HotSec’12, pages 2–2, Berkeley, CA, USA. USENIX
Association.
Ortolani, S., Giuffrida, C., and Crispo, B. (2010). Bait your
hook: A novel detection technique for keyloggers. In
Jha, S., Sommer, R., and Kreibich, C., editors, Re-
cent Advances in Intrusion Detection, pages 198–217,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Reina, A., Fattori, A., Pagani, F., Cavallaro, L., and Br-
uschi, D. (2012). When hardware meets software: A
bulletproof solution to forensic memory acquisition.
In Proceedings of the 28th Annual Computer Security
Applications Conference, ACSAC ’12, pages 79–88,
New York, NY, USA. ACM.
Schmidt, M. S. (2012). Credit card data breach at barnes
noble stores.
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., In-
vernizzi, L., Markov, Y., Comanescu, O., Eranti, V.,
Moscicki, A., Margolis, D., Paxson, V., and Bursztein,
E., editors (2017). Data breaches, phishing, or mal-
ware? Understanding the risks of stolen credentials.
Thomson, I. (2013). How the nsa hacks pcs, phones,
routers, hard disks ’at speed of light’: Spy tech cat-
alog leaks.
Van Bulck, J., Piessens, F., and Strackx, R. (2017). Sgx-
step: A practical attack framework for precise enclave
execution control. In Proceedings of the 2Nd Work-
shop on System Software for Trusted Execution, Sys-
TEX’17, pages 4:1–4:6, New York, NY, USA. ACM.
Wang, D., Cheng, H., Wang, P., Yan, J., and Huang,
X. (2018). A security analysis of honeywords. In
25th Annual Network and Distributed System Security
Symposium, NDSS 2018, San Diego, California, USA,
February 18-21, 2018.
Zhang, F. (2013). Iocheck: A framework to enhance the
security of i/o devices at runtime. In 2013 43rd An-
nual IEEE/IFIP Conference on Dependable Systems
and Networks Workshop (DSN-W), volume 00, pages
1–4.
Zhang, F., Leach, K., Stavrou, A., Wang, H., and Sun, K.
(2015a). Using hardware features for increased de-
bugging transparency. In 2015 IEEE Symposium on
Security and Privacy (SP), volume 00, pages 55–69.
Zhang, F., Leach, K., Wang, H., and Stavrou, A. (2015b).
Trustlogin: Securing password-login on commodity
operating systems. In Proceedings of the 10th ACM
Symposium on Information, Computer and Communi-
cations Security, ASIA CCS ’15, pages 333–344, New
York, NY, USA. ACM.
SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques
587