DJ Tian, A Bates, K Butler - Proceedings of the 31st Annual Computer …, 2015 - dl.acm.org
USB attacks are becoming more sophisticated. Rather than using USB devices solely as a delivery mechanism for host-side exploits, attackers are targeting the USB stack itself …
B Camredon - SSTIC 2016, 2016 - airbus-seclab.github.io
The USBiquitous project is a set of open source tools to interact with USB communications. It is composed of a hardware part embedding a Linux system with a bespoke kernel module …
USB ports are everywhere, from laptops and phones to TVs and even microwave ovens. They provide a convenient, reasonably fast interconnect that consumers are familiar with …
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However, the complex nature of USB obscures the true functionality of devices from the user, and …
Targeted attacks via transient devices are not new. How-ever, the introduction of BadUSB attacks has shifted the attack paradigm tremendously. Such attacks embed malicious code …
Today, the USB protocol is among the most widely used protocols—mostly due to its plug- and-play nature and number of supported devices. However, the mass-proliferation of USB …
Z Wang, A Stavrou - Proceedings of the 26th Annual Computer Security …, 2010 - dl.acm.org
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple's …
EL Loe, HC Hsiao, THJ Kim, SC Lee… - 2016 IEEE 3rd World …, 2016 - ieeexplore.ieee.org
This work investigates two emerging attacks-Human Interface Device (HID) attack and Juice Jacking attack-that leverage USB peripherals, and proposes countermeasures to defend …
J Fu, J Huang, L Zhang - … Security: 20th International Conference, ISC 2017 …, 2017 - Springer
In recent years, many attacks targeting USB were proposed. Besides spreading virus through USB storage, attackers are tending to attack USB stacks because in most cases, any …