Fact-checked by Grok 2 weeks ago

Secure attention key

A secure attention key (SAK), also known as a secure attention sequence (SAS), is a specialized combination or signal designed to establish a trusted communication between a user and an operating system's secure subsystem, primarily to prevent or programs from intercepting sensitive input such as credentials. This mechanism ensures that critical operations like occur in an isolated , free from interference by untrusted processes, and has been a foundational element of secure since the early days of multi-user systems. The concept originated in the context of bases (TCBs) for systems aiming to meet standards such as the U.S. Department of Defense's C2-level criteria, where a SAK provides an "undefeatable" method to terminate suspicious applications masquerading as interfaces. In practice, the SAK triggers a system-level that kills processes attempting to access the console or input stream, thereby restoring a clean state for legitimate authentication. For instance, in systems including , the SAK is configurable via tools like loadkeys and typically mapped to sequences such as Ctrl++Pause, which operates in raw keyboard mode to terminate any process holding the /dev/console , including graphical interfaces like the if necessary. In Microsoft Windows, the is most famously implemented as the Ctrl+Alt+Del combination, a hardware-generated (NMI) that Winlogon.exe registers at boot to exclusively handle, preventing other applications from capturing or simulating it. Upon activation, it invokes the Logon UI to display secure credential prompts, supporting features like authentication where users enter a PIN instead of passwords, thus mitigating risks from keyloggers or screen scrapers. Windows adapts the SAS for different : on tablets, it may use the Windows Security button or power/volume combinations, detected via HID usage codes reported by drivers. IBM AIX and related systems employ a SAK to enforce trusted paths for operations like password changes, using sequences such as Ctrl+X or Ctrl+R to invoke a trusted shell (tsh) that verifies the integrity of executed programs and terminates unauthorized sessions or remote access attempts. This remote SAK functionality, invocable via commands, ensures secure communication even over networks, though it may disrupt ongoing connections to prioritize . While effective against classic attacks, modern implementations face challenges from advanced persistent threats, such as firmware-level that could potentially bypass the SAK; nonetheless, it remains a critical layer in defense-in-depth strategies for across environments.

Definition and Purpose

Core Concept

A secure attention key (SAK) is a special or combination that a presses prior to to invoke the (TCB) of an operating system, thereby initiating a protected interaction with the subsystem. The TCB comprises the set of system components responsible for enforcing policies, ensuring that login and related processes are handled exclusively by verified, tamper-resistant elements. The terms "secure attention key" (SAK) and "secure attention sequence" (SAS) are frequently used interchangeably in technical literature. For example, in Windows, the SAS is implemented as Ctrl+Alt+Del. This mechanism aligns with requirements in security evaluation criteria, such as the (TCSEC), where a trusted path must be user-initiated to guarantee isolation from untrusted processes. This mechanism also aligns with modern standards such as the (ISO/IEC 15408), which require trusted paths for higher assurance levels. The primary intent of the SAK is to establish a trusted path—a logically isolated communication channel—between the user and the subsystem, thereby preventing , modification, or spoofing of sensitive inputs like passwords by unauthorized software. This path ensures that all interactions during critical operations, such as initial or security level changes, are unmistakably distinguishable from normal system paths and protected from external interference. Conceptually, pressing the SAK signals the user's intent for secure engagement, prompting the system to isolate the interaction—such as by terminating console-holding processes in systems or invoking a secure in Windows—ensuring only TCB-mediated operations occur and bypassing potential or influences. This model underpins the assurance that the authentication process remains under the direct of the , fulfilling foundational objectives in multi-user environments.

Security Role

The secure attention key (SAK) serves a critical function in verifying that prompts, such as interfaces, originate directly from the or (), rather than from potentially compromised user-mode applications that could mimic legitimate system processes. By requiring users to invoke the SAK prior to entering credentials, the mechanism ensures that any displayed prompt is generated by trusted system components, thereby maintaining the integrity of the process against subversion by malicious software operating at the user level. This capability directly protects against man-in-the-middle (MITM) attacks during credential entry, where an attacker might intercept or spoof the to capture sensitive information. The SAK establishes a trusted path that isolates the between the and the , preventing unauthorized or by untrusted entities and ensuring that credentials are transmitted solely to the legitimate system kernel. The SAK aligns with foundational security standards outlined in the (TCSEC), commonly known as , particularly in its requirements for a trusted path in higher assurance classes ( and above). Under TCSEC principles, the must support a mechanism—implemented via the SAK—to enable user-initiated, logically isolated communications for , upholding the TCB's role in enforcing system-wide without interference from external or user-mode influences. Furthermore, the SAK enforces a strict separation between user-mode and -mode operations during by diverting control directly to the upon invocation, which in some systems terminates active user-level processes on while in others invokes a protected , restarting the trusted procedure from the . This separation prevents user-mode from retaining control or injecting false prompts, thereby preserving the 's authority over critical security functions and bolstering overall system integrity.

Historical Development

Origins in Multi-User Systems

The secure attention key (SAK) originated in the late amid efforts to enhance security in multi-user operating systems, particularly in environments featuring multiple dumb terminals connected to a central host. These setups, common in academic and research institutions as well as early Department of Defense (DoD) installations, allowed remote logins but exposed users to risks from malicious software that could intercept credentials. The SAK was conceived as a hardware-interrupt mechanism to establish a trusted path directly to the , bypassing potentially compromised user-space processes. This addressed the need for reliable in shared resources, where physical access to terminals was distributed but oversight was limited. A key driver for the SAK's development was the DoD's push for formalized security criteria in multi-user systems, culminating in the 1983 (TCSEC), known as The TCSEC mandated a trusted communication path for initial and in higher classes ( and B3), requiring it to be user-initiated, logically isolated, and distinguishable from other paths to prevent interception or spoofing. This standard built on earlier DoD initiatives from the mid-1970s, such as the 1977 Computer Security Initiative, which emphasized in resource-sharing systems influenced by precursors like . The SAK directly supported these requirements by enabling users to invoke a secure session without interference from untrusted code. One of the earliest implementations appeared in the Kernelized Secure Operating System (KSOS), a DoD-funded secure variant of Unix developed starting in on PDP-11/70 hardware and documented in 1981. In KSOS, the SAK was implemented using the terminal's "break" character, which the kernel recognized to suspend all user programs, disconnect the terminal from ongoing sessions, and redirect it to the Secure Server for unspoofable access. This mechanism ensured multi-level secure interactions in terminal-based environments, where users might remotely or via shared lines. Similarly, the VAX Virtual Machine Monitor (VMM) security kernel, another 1980s DoD project, designated the as the SAK to operate at all times without interception by untrusted software. The primary motivation for these early SAK features was to counter trojan horses and login spoofing in multi-terminal Unix setups, where a malicious process could masquerade as the system prompt to capture passwords. By killing or isolating non-kernel processes upon SAK activation, the mechanism guaranteed a direct, trusted dialogue with the operating system, mitigating risks inherent to the era's open, networked computing paradigms. Users were encouraged to habitually invoke the SAK before to verify the authenticity of the , a practice rooted in the physical limitations of serial terminals prevalent in the 1970s and 1980s.

Evolution in Modern OS

The secure attention key (SAK) concept, building briefly on foundational influences from early Unix multi-user systems, underwent significant adaptation in the 1990s with its integration into Windows NT to satisfy C2-level security requirements set by the U.S. Department of Defense's (TCSEC). , released in 1994, introduced Ctrl+Alt+Del as the secure attention sequence (SAS), enabling a trusted for that prevented from intercepting login credentials; this feature contributed to the system's C2 certification in July 1995 when configured with 3. Subsequent versions, such as in 1996, retained and refined this mechanism, embedding it as a core component of the operating system's security architecture to ensure kernel-level handling of the sequence. In the early , SAK functionality extended to open-source systems through efforts to align with portable operating system standards, particularly in kernels seeking compatibility with environments. The incorporated SAK handling around 2001, with the primary method using loadkeys to define a sequence such as Ctrl+Alt+Pause to terminate processes on a and establish a secure ; an alternative via the Magic SysRq mechanism (Alt+SysRq+K) is available if enabled, though not recommended. This integration drew from POSIX-inspired portability goals in Unix-derived systems, allowing kernel-level intervention without relying on user-space applications, though it remained optional and configurable via /proc/sys/kernel/sysrq. As operating systems transitioned from text-based hardware terminals to graphical user interfaces (GUIs) and network-based remote access in the mid-2000s and beyond, SAK implementations evolved to accommodate these environments while preserving security guarantees. In graphical desktops, sequences like Ctrl+Alt+Del in Windows persisted for local sessions but adapted for remote protocols; for instance, (RDP) uses Ctrl+Alt+End to invoke the SAS on remote machines, ensuring the kernel processes the request without interception by the client application. Similarly, SysRq-based SAK faced challenges in X11 and compositors, prompting discussions on GUI-aware extensions to maintain efficacy in virtualized or display-server-mediated sessions without disrupting user workflows. By the 2020s, up to 2025, SAK evolution in modern OSes has increasingly balanced with usability, particularly in consumer editions where stringent requirements can hinder accessibility. In and 11 client versions, the SAS is disabled by default via (Interactive logon: Do not require CTRL+ALT+DEL), allowing direct password entry to streamline logins for non-enterprise users, though it remains enforceable in server and domain-joined setups. distributions for desktops, such as and , similarly de-emphasize SysRq SAK in favor of simpler lock mechanisms like Super+L, amid ongoing debates in communities about its in low-threat consumer scenarios versus the added friction for everyday users. These shifts reflect broader efforts, including alignments with NIST guidelines for trusted paths, prioritizing configurability to suit diverse deployment contexts.

Technical Mechanism

Operational Process

The operational process of a Secure Attention Key (SAK) begins with detection, where pressing the designated key sequence on the generates a hardware interrupt from the . This interrupt is routed directly to the operating system kernel's input subsystem, which processes it in raw mode before any user-mode applications can receive or interpret the keystrokes. Upon recognition of the SAK sequence by the kernel's , the system responds by isolating from user-mode processes to establish a trusted execution path. This may involve terminating processes accessing the console in systems or switching to a secure in Windows to prevent interference from malicious or compromised software. The then isolates the session from prior user-space activities, preventing unauthorized observation or injection of data. The complete flow operates as a sequence: user input of the combination triggers the hardware interrupt; the 's handler validates and processes the SAK event; an isolation step follows, including process termination or desktop switching as needed; finally, the activates the system's module, which renders a trusted on a secure path. In cases of invocation during non-login states, such as an active user session, the kernel routes the event to invoke context-appropriate security functions, with behavior varying by OS; for instance, in Windows this may result in the activation of a task manager interface or security dialog without terminating the session, while in Linux it can terminate the graphical server. This process ensures the SAK's general role in preventing user-mode interference with sensitive operations.

System-Level Requirements

The Secure Attention Key (SAK) necessitates specific capabilities to ensure reliable detection of the designated key sequence, preventing interception by malicious software. Primarily, this requires a that supports interrupt-driven input, allowing the system to process key presses at the hardware level without reliance on user-space drivers. Standard PC-compatible keyboards fulfill this need, as they generate interrupts for each key event that the can prioritize. Additionally, firmware support through or is essential for initializing handling during boot. On the software side, kernel-level implementation is critical for SAK operation, including dedicated handlers that exclusively route the key sequence to the (TCB), preventing user-mode processes from interfering, such as by terminating specific console accesses in systems or using a secure desktop in Windows. This ensures no application can masquerade as the interface. Integration with the system's authentication subsystems—such as Pluggable Authentication Modules () in environments—is required to link the SAK trigger directly to legitimate credential verification, maintaining the integrity of the process. The must operate in a mode that supports raw keyboard input to bypass higher-level filtering. Environmental prerequisites emphasize physical locality, as SAK is inherently tied to direct console access via a local and ; remote sessions, such as those over networks, do not natively support it without extensions that emulate the trusted . This design aligns with the need for a verifiable, user-initiated free from remote . In the basic operational flow, the detects the and isolates console-related processes to prepare for . Configuration of SAK involves administrative tools to enable or disable the feature, often via keymap loading utilities or boot parameters that define , ensuring only privileged users can modify it to avoid unauthorized weakening of . Potential conflicts exist with features like or slow keys, which alter key combination timing or repetition and may interfere with precise sequence detection, requiring careful system tuning to balance usability and .

Implementations

Microsoft Windows

In Microsoft Windows, the Secure Attention Sequence (SAS) has been implemented since the release of in 1993, utilizing the Ctrl+Alt+Del key combination as the default sequence to initiate trusted interactions with the operating system. This hardware-interrupt-based mechanism ensures that the sequence is processed directly by the , bypassing potential interception by malicious user-mode processes and providing a secure path for user authentication. When invoked, Ctrl+Alt+Del displays the Windows Security screen, offering essential functions such as accessing for process monitoring, locking the workstation to prevent unauthorized access, switching users, signing out, or changing passwords. During login or unlock scenarios, the sequence activates the secure desktop—a isolated environment rendered by the Winlogon —to present the credential user interface, thereby mitigating risks from screen overlays or keyloggers. Configuration of the SAS requirement is managed primarily through Group Policy in enterprise settings, located at Computer Configuration > Administrative Templates > Windows Components > Windows Logon Options > Interactive logon: Do not require CTRL+ALT+DEL; enabling this policy removes the mandatory prompt, while disabling it enforces the sequence. This setting corresponds to the registry value at HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCAD, where a DWORD of 1 disables the requirement and 0 enables it, allowing administrators to balance security and usability. An additional policy, Disable or enable software Secure Attention Sequence under the same path, controls whether non-hardware methods (e.g., for remote desktop sessions) can generate the SAS, with options limited to keyboard, services, or none. In consumer editions of and 11, the Ctrl+Alt+Del requirement is optional and disabled by default to streamline the on personal devices. Conversely, server editions maintain the as mandatory by default during installation and logon to uphold stricter standards in production environments.

Linux and Systems

In traditional systems, the Secure Attention Key (SAK) originated from terminal-based mechanisms to establish a trusted path, preventing unauthorized programs from intercepting input during . In AIX, the SAK is invoked by the key sequence Ctrl-X followed by Ctrl-R, which creates a trusted communication path for secure interactions such as changes. This feature ties into AIX's (TCB), allowing access to trusted processes and shells when enabled. AIX supports per-terminal customization of the SAK through the /etc/security/login.cfg file, where the sak_enabled attribute can be set to true or false in individual terminal stanzas, enabling administrators to disable it for specific ports used by utilities like uucp while keeping it active elsewhere. Similarly, in Oracle Solaris 11.4 and later, the SAK sequence is Stop-A on SPARC systems or F1-A on x86 systems, used to invoke the Trusted Path login prompt on physical consoles, such as for administrative access to immutable zones. This mechanism ensures a clean path to system security features. In modern kernels, the primary SAK implementation leverages the , a feature introduced in kernel 2.1.47 (1997) and refined in the 2.6 series for enhanced reliability. The sequence Alt + SysRq + 'k' serves as the SAK, terminating all non-init processes on the current to eliminate potential trojan password captors and ensure a trustworthy prompt. This directly integrates with the getty process, as the restarts getty after cleanup, providing a secure environment free from console-attached . Configuration of the Magic SysRq, including SAK functionality, occurs via the /proc/sys/[kernel](/page/Kernel)/sysrq file, where a bitmask value (e.g., 4 to enable only SAK via bit 2) allows granular control; setting it to 0 disables all SysRq operations, while 1 enables everything by default if compiled with CONFIG_MAGIC_SYSRQ. also offers an alternative SAK via the loadkeys utility, commonly mapped to Ctrl + Alt + Pause (keycode 101), which kills processes holding /dev/console open—such as the , gpm, or daemons—restarting the console in 5 if applicable. This method, documented since March 2001, requires root privileges for reprogramming and operates in raw keyboard mode to bypass user-space interference. Processes affected can be identified beforehand with ls -l /proc/[0-9]*/fd/* | [grep](/page/Grep) console, and workarounds like redirecting input (e.g., gpm < /dev/null) prevent unintended kills.

Security Implications

Mitigated Threats

The secure attention key (SAK) primarily mitigates threats from login screens, where impersonates the operating system's login interface to capture user credentials. By requiring a special key sequence that is exclusively handled at the kernel level, SAK ensures that the process is initiated through a trusted , preventing user-space applications from intercepting or spoofing the login prompt. In multi-user environments, SAK addresses by terminating all non-essential processes on the affected terminal, restoring a clean state that prevents unauthorized access to active sessions and reduces opportunities for attackers to exploit lingering processes. Historical examples of threats mitigated by SAK include trojan horses on 1980s and 1990s shared Unix systems, where attackers deployed fake login programs on multi-user terminals to steal passwords from unsuspecting users. In contemporary graphical interfaces, SAK thwarts phishing overlays, such as that superimposes fraudulent login windows over legitimate ones to harvest credentials.

Limitations and Enhancements

Despite its effectiveness in establishing a trusted path during login, the secure attention key (SAK) has notable limitations. In systems, invoking the SAK—typically configured as Ctrl-Alt-Pause—kills all processes with open file descriptors to /dev/console, which can inadvertently terminate legitimate background services such as the gpm mouse daemon or Vixie cron, potentially disrupting system operations. This behavior stems from the mechanism's design to ensure no masquerading applications can intercept input, but it requires careful configuration, such as redirecting daemon inputs to /dev/null or modifying scripts to avoid console redirections. Furthermore, traditional SAK implementations are primarily confined to login scenarios and do not extend protection to in-application interactions, leaving users vulnerable to attacks where credentials are entered into malicious apps without invoking the trusted path. User behavior also poses challenges; individuals may fail to recognize situations requiring SAK or neglect to use it habitually, undermining its protective role against password capturers. In Windows, the secure (SAS), implemented as Ctrl+Alt+Del, can be disabled via for convenience, which reduces its enforcement and exposes systems to spoofed screens, particularly in environments prioritizing over strict . To address these shortcomings, enhancements have focused on broadening trusted path applicability and improving verification. One approach involves trusted visual I/O paths (TIVOs), which extend beyond by allowing activation via combinations (e.g., Power + Volume Up on ) to annotate input fields with secure indicators like OS-generated images and app icons, enabling users to confirm the recipient application and thwart ; user studies showed 19 out of 22 participants correctly identifying attacks with this mechanism. In password systems, end-to-end paradigms integrate SAK-like protocols with zero-knowledge proofs and strong password protocols (e.g., SRP) to centralize credential entry at the OS level, mitigating risks from uninvoked trusted paths while incorporating indicators for . Windows has enhanced through (UAC), where elevation prompts appear on the Secure Desktop—a system-controlled environment that isolates the interaction from user applications and prevents hooking or spoofing during privilege escalations—providing a trusted path similar to the but activated independently by elevation requests. Additionally, conditioned-safe ceremonies train users to associate specific visual or haptic cues with trusted paths, reinforcing habitual SAK usage without relying solely on key sequences. These developments prioritize alongside , though full adoption varies across operating systems.

References

  1. [1]
    Linux Secure Attention Key (SAK) handling
    Mar 18, 2001 · An operating system's Secure Attention Key is a security tool which is provided as protection against trojan password capturing programs.Missing: computer | Show results with:computer
  2. [2]
    Smart Card Architecture | Microsoft Learn
    Oct 29, 2024 · The CTRL+ALT+DEL key combination is called a secure attention sequence (SAS). To keep other programs and processes from using it, Winlogon ...
  3. [3]
    Trusted path, trusted shell, and Secure Attention Key - IBM
    This path is used when a secure communication path with the system is required, such as when you are changing passwords or logging in to the system.Missing: computer | Show results with:computer
  4. [4]
    How does Windows decide what instructions to provide for ...
    Mar 1, 2022 · If a keyboard is attached, then also Ctrl + Alt + Del . Is a Tablet PC, Ctrl + Alt + Del or Windows Security button. Otherwise, Ctrl ...Missing: computer | Show results with:computer<|control11|><|separator|>
  5. [5]
    [PDF] Trusted Computer System Evaluation Criteria ["Orange Book"]
    Oct 8, 1998 · Requirement 1 - SECURITY POLICY - There must be an explicit and well-defined security policy enforced by the system.
  6. [6]
    [PDF] Human Factors in Web Authentication - UC Berkeley EECS
    Feb 6, 2009 · ... man-in-the-middle (MITM) attacks [113, 144]. Since these attacks ... secure attention key (SAK). A SAK is a mandatory special key ...
  7. [7]
    [PDF] A Case Study in Security Requirements Engineering for a High ...
    The TCB shall provide a Secure Attention Key (SAK) mech- anism to invoke a trusted path from workstations to which the TCB has been extended. A.3.2.1.2. The TCB ...
  8. [8]
    [PDF] Computer Security
    This book, which has an orange cover, is usually called the "orange book" or the "TCSEC. ... If a secure attention key is used, it is important that users.
  9. [9]
    [PDF] KSOS Final Report (Kernelized Secure Operating System). - DTIC
    Aug 1, 1981 · There was substantial mechanism in KSOS. (secure attention key, etc.) to ensure unspoofable access to the system, but this was not really ...
  10. [10]
    [PDF] Perrine: The Kernelized Secure Operating System (KSOS) - USENIX
    The “Orange Book” hadn't been written yet. The experiences from developing ... When a user hit the “secure attention” key (such as. BREAK), all user ...
  11. [11]
    [PDF] The Security Problem
    Windows NT 3.5 (workstation and server) with SP3 earned C2 in. July 1995. In ... “secure attention sequence” (SAS) - Ctrl-Alt-Del. Trusted Facility ...
  12. [12]
    [DOC] C2 Administrator's and User's Security Guide
    With Windows NT 4.0 security, the user must type the secure attention sequence, CTRL+ALT+DEL. This series of keystrokes always displays the Windows NT 4.0 ...
  13. [13]
    Linux Secure Attention Key (SAK) handling
    Mar 18, 2001 · An operating system's Secure Attention Key is a security tool which is provided as protection against trojan password capturing programs.
  14. [14]
    [patch] Secure Attention Key handling - LWN.net
    ... Secure Attention Key handling The do_SAK() function is called from within interrupt context. ... standard input is redirected to /dev/null. 3: Test SAK ...
  15. [15]
    How do I send Ctrl Alt Delete on a Windows remote device?
    Mar 5, 2024 · I want to know what are the steps to do if I want to use the ctrl alt del sequence to open the task menu on a remote Windows computer.
  16. [16]
    SendSAS function (sas.h) - Win32 apps | Microsoft Learn
    Oct 13, 2021 · Simulates a secure attention sequence (SAS). Syntax. VOID SendSAS( [in] BOOL AsUser );. Parameters. [in] AsUser. TRUE if the caller is running ...
  17. [17]
    Why does Windows 10 not have the secure attention key as default?
    Feb 28, 2017 · My understanding of the CTRL + ALT + DEL keyboard combination is that it is "hard wired" into the bios and triggers an interrupt which ...Missing: KSOS | Show results with:KSOS
  18. [18]
    Credentials Processes in Windows Authentication - Microsoft Learn
    Jun 30, 2025 · Winlogon always starts the process Logon UI after it receives a secure attention sequence event. Logon UI queries each credential provider for ...
  19. [19]
    Responsibilities of the GINA - Win32 apps | Microsoft Learn
    Jan 7, 2021 · The GINA is responsible for recognizing a secure attention sequence (SAS), monitoring for SAS events, and notifying Winlogon when a SAS has occurred.
  20. [20]
    Authentication Functions - Win32 apps | Microsoft Learn
    Jan 7, 2021 · Winlogon calls this function when it receives a secure attention sequence (SAS) event while the user is logged on and the workstation is not ...
  21. [21]
    Linux Secure Attention Key (SAK) handling — The Linux Kernel documentation
    ### Summary of Linux Secure Attention Key (SAK) Handling
  22. [22]
    Windows Credential User Interface with secure attention sequence
    Jun 16, 2018 · In Windows NT, Ctrl + Alt + Delete is known as the secure attention sequence or SAS. If you ever tried installing Windows Server 2003, you will be prompted to ...Missing: Key C2 history
  23. [23]
    What's the rationale behind Ctrl-Alt-Del for login
    Apr 28, 2013 · The Windows (NT) kernel is designed to reserve the notification of ... (Secure Attention Sequence) used in Windows) is that the Linux ...
  24. [24]
    Interactive logon Do not require CTRL+ALT+DEL - Windows 10
    Apr 19, 2017 · Requiring CTRL+ALT+DELETE before users sign in ensures that users are communicating through a trusted path when entering their passwords. A ...
  25. [25]
  26. [26]
  27. [27]
    Common Desktop Environment - Solaris 10 11/06 Release Notes
    The Secure Attention key or hot key, Alt+Break, on PC keyboards does not work on x86 systems. No error message is displayed. Workaround: None. x86: Cannot ...
  28. [28]
    Linux Magic System Request Key Hacks
    It is a 'magical' key combo you can hit which the kernel will respond to regardless of whatever else it is doing, unless it is completely locked up.
  29. [29]
    Security Briefs: Customizing GINA, Part 1 - Microsoft Learn
    Secure Attention Sequence. Before diving in head first, let me explain a concept that you'll often run into. A secure attention sequence (SAS) is something ...
  30. [30]
    [PDF] An Overview of Computer Security - arXiv
    The first mechanism discussed is the secure attention key. This ... [4] Schrage, M., Teen Computer Break-Ins: High-Tech Rite of passage, Washington Post.
  31. [31]
    Trojan Horses
    Oct 9, 1990 · ... secure attention key", or SAK for short. The idea is that some special key sequence is associated with the user wanting to validate the path ...
  32. [32]
    [PDF] TIVOs: Trusted Visual I/O Paths for Android - University of Michigan
    Jul 18, 2014 · On Linux it is called the Secure Attention Key [19] and on Windows its the Ctrl-Alt-Del combination. TIVOs are not restricted to login prompts, ...
  33. [33]
    [PDF] End-to-End Passwords - New Security Paradigms Workshop
    Additionally, attacks against the com- munication channel's security (e.g., TLS man-in-the-middle [81]) can also divulge the user's password to an attacker.
  34. [34]
    [PDF] Windows® 7 Resource Kit - Microsoft Download Center
    Aug 13, 2006 · The Secure Desktop mode is the same mode that a user sees when she logs on to her computer or presses the Secure Attention Sequence (SAS) ...