Abstract: This paper presents a detailed methodological analysis of the attack surface presented by highly configurable text editors that can be used for building Keylogger scripts. Specifically, it ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results