Review Article

Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service

Table 3

Security techniques for the PS/2 and USB keyboards.

InterfaceSecurity techniquesDescription

PS/2Message hookingPreempts keyboard data by hooking keyboard message
Inserting the filter driverPreempts keyboard data by inserting filter driver inside the PS/2 keyboard driver stack
Interrupt object replacementPreempts keyboard data by replacing the object processing interrupt related PS/2 keyboard
IDT replacementPreempts keyboard data by replacing the interrupt descriptor table related PS/2 keyboard
Generating random scan code using the 0xD2 commandDisrupts keyboard data by generating random scan code using the 0xD2 command
Generating random scan code using the keyboard internal memoryDisrupts keyboard data by generating random scan code stored in the keyboard internal memory
Using the debug exception handlerPreempts keyboard data using the debug exception handler when accessing input and output memories or ports related to the PS/2 keyboard

USBInserting filter driverPreempts keyboard data by inserting filter driver inside the USB keyboard driver stack
Inline hookingPreempts keyboard data by hooking function processing the USB keyboard data