Circumventing keyloggers and screendumps | IEEE Conference Publication | IEEE Xplore