作者
Kyle Denney, Enes Erdin, Leonardo Babun, A Selcuk Uluagac
发表日期
2019/5/15
图书
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
页码范围
328-329
简介
Malicious USB devices can disguise themselves as benign devices (e.g., keyboard, mouse, etc.) to insert malicious commands on end devices. Advanced software-based detection schemes (deeper operating system level) are used to identify the malicious nature of such mimic devices. However, a powerful adversary (e.g., as rootkits or advanced persistent threats) can subvert those software-based detection schemes. To address these concerns, we present our ongoing work to dynamically detect these threats in hardware. Specifically, we utilize a novel hardware-assistance mechanism to collect unaltered USB data at the physical layer which is fed into a machine learning-based classifier to determine the true nature of the USB device.
引用总数
2019202020212022202311221
学术搜索中的文章
K Denney, E Erdin, L Babun, AS Uluagac - Proceedings of the 12th Conference on Security and …, 2019