TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes

12 点作者 christianbryant将近 7 年前

2 条评论

christianbryant将近 7 年前
I think the cool factor here is that they &quot;propose a new idea, pre-IME, which guarantees that “Is this touch event a sensitive keystroke?” analysis will always access user touch events prior to the execution of any IME app code.&quot;<p>In the paper they note as &quot;a pre-IME design, IM-Visor always recognizes and isolates sensitive keystrokes before the IMEs could access them. To achieve this, whenever a user intends to type in a soft keyboard, the STIE will be initialized to intercept touch events and analyze whether it is a sensitive keystroke.&quot;<p>This model is one that begs a matching and reversed exploration of &quot;sensitive keystroke&quot; emulation and whether such pre-IME analysis can be fooled.
olliej将近 7 年前
I’m not sure this is a good solution, but maybe it’s the best “general” fix.<p>Basically an OS should be able to easily identify when you’re using a platform password field for instance and not interact with the IM (although that causes problems with assistive technologies). But the OS can’t really handle every third party reimplementation of password fields. Presumably a 3rd party solution would be able to rev faster and stay more up to date than the OS. (The risk balance when the OS is involved is higher than for just the IM as if it does break you can always remove the “visor”, but doing so in the os is harder.
评论 #17494033 未加载