Abstract: This paper presents a detailed methodological analysis of the attack surface presented by highly configurable text editors that can be used for building Keylogger scripts. Specifically, it ...