Review Article
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service
Table 3
Security techniques for the PS/2 and USB keyboards.
| Interface | Security techniques | Description |
| PS/2 | Message hooking | Preempts keyboard data by hooking keyboard message | Inserting the filter driver | Preempts keyboard data by inserting filter driver inside the PS/2 keyboard driver stack | Interrupt object replacement | Preempts keyboard data by replacing the object processing interrupt related PS/2 keyboard | IDT replacement | Preempts keyboard data by replacing the interrupt descriptor table related PS/2 keyboard | Generating random scan code using the 0xD2 command | Disrupts keyboard data by generating random scan code using the 0xD2 command | Generating random scan code using the keyboard internal memory | Disrupts keyboard data by generating random scan code stored in the keyboard internal memory | Using the debug exception handler | Preempts keyboard data using the debug exception handler when accessing input and output memories or ports related to the PS/2 keyboard |
| USB | Inserting filter driver | Preempts keyboard data by inserting filter driver inside the USB keyboard driver stack | Inline hooking | Preempts keyboard data by hooking function processing the USB keyboard data |
|
|