USB-based attacks

N Nissim, R Yahalom, Y Elovici - Computers & Security, 2017 - Elsevier
… for launching cyber-attacks. In this survey, we review 29 different USB-based attacks and
utilize our new taxonomy to classify them into four major categories. These attacks target both …

Usblock: Blocking usb-based keypress injection attacks

S Neuner, AG Voyiatzis, S Fotopoulos… - Data and Applications …, 2018 - Springer
USB-Based Keypress Injection Attacks We consider a keypress injection attack as the most
severe USB-based … This is because a carefully-crafted attack, launched through innocent-…

Exploring the taxonomy of USB-based attacks

M Mamchenko, A Sabanov - 2019 Twelfth International …, 2019 - ieeexplore.ieee.org
… In this paper both common attacks taxonomies and specific ones (for the USB-based attacks)
… the existing taxonomies, and propose a generalized uniform USBbased attacks taxonomy. …

[图书][B] Seven deadliest USB attacks

B Anderson, B Anderson - 2010 - books.google.com
… In Chapter 4, we will provide you with a real-world example of USB-based heap overflow,
which was unveiled by researchers at a Black Hat conference to gain administrative access to …

Implementing USB Attacks with Microcontrollers

A Rodríguez Ocasio - Computer Science Program, 2019 - prcrepository.org
… Implementing these attacks can be easily achieved by using commercially available tools
or a … types of USB attacks and explore how tools capable of automating such attacks can be …

Survey On Micro-Controller Based Bad USB Attacks

BSV Charan, L Kulkarni - Journal of Positive School Psychology, 2023 - journalppw.com
attacks are a type of USB attack that is similar to the more common USB drive attacks. This
USB-based attacks, as noted by security researchers such as Dave (Jing) Tian, Nolen Scaife…

[HTML][HTML] USB powered devices: A survey of side-channel threats and countermeasures

H Liu, R Spolaor, F Turrin, R Bonafede… - High-Confidence …, 2021 - Elsevier
… Differently from other surveys on USB-based attacks via the communication interface only,
this survey considers research works that aim to infer or extract private information from the …

Dynamically detecting usb attacks in hardware: Poster

K Denney, E Erdin, L Babun, AS Uluagac - Proceedings of the 12th …, 2019 - dl.acm.org
… the threat of USB-based attacks, specifically in mitigating rapid-keystroke injection attacks,
where a USB device mimics the keystrokes of a user and types an attack directly into the user’…

A story-driven gamified education on USB-based attack

V Rikkers, DK Sarmah - Journal of Computing in Higher Education, 2023 - Springer
… The goal of this study was to test the effectiveness of story-driven gamification in the
prevention of USB-based attacks among students. To do this a story-driven gamified training was …

[HTML][HTML] Duck Hunt: Memory forensics of USB attack platforms

T Thomas, M Piscitelli, BA Nahar, I Baggili - Forensic Science International …, 2021 - Elsevier
… To explore the memory forensic artifacts generated by USB-based attack platforms, we
analyzed two of the most popular commercially available devices, Hak5's USB Rubber Ducky …