Advanced Keylogger- A Stealthy Malware for Computer Monitoring

  • Aarushi Dwivedi
  • Krishna Chandra Tripathi
  • M.L. Sharma
Keywords: Malware, Keyloggers, Hacking, Security, Computer monitoring


Modern society is far more dependent on electronic devices than the previous generations. This dependency has both pros and cons. Although the list of pros is endless, they can easily be outweighed by one con which is being vulnerable to malicious programs. Keylogger is one such malware. Earlier, the prime focus was just limited to recording keystrokes made by a user but now are known for incorporating a multitude of features. Keyloggers are used to steal confidential information covertly and their detection is not quite simple since they execute completely in stealth mode. In this exposition, an advanced software keylogger is proposed which is compared with the existing keyloggers based on two criteria, first being the number of features incorporated and second, the CPU usage while the keylogger is being executed. The evaluation posits that the proposed keylogger contains more features with keeping the CPU usage to a minimum hence making it difficult to be detected by the user.


[1] S. Moses, J. Mercado, A. Larson and D. Rowe, "Touch interface and keylogging malware," 2015 11th International Conference on Innovations in Information Technology (IIT), Dubai, 2015, pp. 86-91.doi: 10.1109/INNOVATIONS.2015.7381520
[2] P. Tuli, P. Sahu, “System Monitoring and Security Using Keylogger”, International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 2, Issue. 3, March 2013, pg.106 – 111.
[3] Murugan, S; Kuppusamy, K. ‘System and methodology for unknown malware attack’. Second IEEE International Conference on Sustainable Energy and Intelligent System (SEISCON 2011)
[4] A. Solairaj, S. C. Prabanand, J. Mathalairaj, C. Prathap and L. S. Vignesh, "Keyloggers software detection techniques," 2016 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, 2016, pp. 1-6, doi: 10.1109/ISCO.2016.7726880
[5] Ladakis, L. Koromilas, G. Vasiliadis, et. al.,” You Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger”, EuroSec’13 April 14 2013, Prague, Czech Republic.
[6] A. Kuncoro, B. Kusuma, “Keylogger Is A Hacking Technique That Allows Threatening Information On Mobile Banking User”, 2018 3rd International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia.
[7] M. Dadkhah, A. Ciobotaru, et. al, “An Introduction to Undetectable Keyloggers with Experimental Testing”, International Journal of Computer Networks and Communications Security - September 2014

[8] Albabtain, Y; Yang, B. ‘The process of reverse engineering GPU malware and provide protection to GPUs’. 17th IEEE International Conference On Trust, Security and Privacy in Computing and Communications, and 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, US, 2018. DOI: 10.1109/TrustCom/BigDataSE.2018.00248.
[9] Arghire, I. ‘Business users targeted by HawkEye keylogger malware’. Security Week, 28 May 2019. Accessed Jan 2020.
[10] Figure 8: Comparing the proposed virtual keyboard with QWERTY and ABC keyboards. February 2020 Network Security 19 FEATURE Volume 6, 2018. DOI: 10.1109/ ACCESS.2018.2884964.
How to Cite
Dwivedi, A., Tripathi, K. C., & Sharma, M. (2021). Advanced Keylogger- A Stealthy Malware for Computer Monitoring. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 7(1), 137-140.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.