Dynamically detecting usb attacks in hardware: Poster

K Denney, E Erdin, L Babun, AS Uluagac - Proceedings of the 12th …, 2019 - dl.acm.org
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019dl.acm.org
Malicious USB devices can disguise themselves as benign devices (eg, keyboard, mouse,
etc.) to insert malicious commands on end devices. Advanced software-based detection
schemes (deeper operating system level) are used to identify the malicious nature of such
mimic devices. However, a powerful adversary (eg, as rootkits or advanced persistent
threats) can subvert those software-based detection schemes. To address these concerns,
we present our ongoing work to dynamically detect these threats in hardware. Specifically …
Malicious USB devices can disguise themselves as benign devices (e.g., keyboard, mouse, etc.) to insert malicious commands on end devices. Advanced software-based detection schemes (deeper operating system level) are used to identify the malicious nature of such mimic devices. However, a powerful adversary (e.g., as rootkits or advanced persistent threats) can subvert those software-based detection schemes. To address these concerns, we present our ongoing work to dynamically detect these threats in hardware. Specifically, we utilize a novel hardware-assistance mechanism to collect unaltered USB data at the physical layer which is fed into a machine learning-based classifier to determine the true nature of the USB device.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果