Usbips Framework: Protecting Hosts from Malicious Usb Peripherals

CY Wang, FH Hsu - Available at SSRN 4847047 - papers.ssrn.com
USB-based attacks have increased in complexity in recent years. Modern attacks
incorporate a wide range of attack vectors, from social engineering to signal injection. The …

Defending against malicious USB firmware with GoodUSB

DJ Tian, A Bates, K Butler - Proceedings of the 31st Annual Computer …, 2015 - dl.acm.org
USB attacks are becoming more sophisticated. Rather than using USB devices solely as a
delivery mechanism for host-side exploits, attackers are targeting the USB stack itself …

[PDF][PDF] USBiquitous: USB intrusion toolkit

B Camredon - SSTIC 2016, 2016 - airbus-seclab.github.io
The USBiquitous project is a set of open source tools to interact with USB communications. It
is composed of a hardware part embedding a Linux system with a bespoke kernel module …

[PDF][PDF] USB-undermining security barriers

A Davis - Black Hat Briefings, 2011 - cs.uno.edu
USB ports are everywhere, from laptops and phones to TVs and even microwave ovens.
They provide a convenient, reasonably fast interconnect that consumers are familiar with …

Making {USB} great again with {USBFILTER}

DJ Tian, N Scaife, A Bates, K Butler… - 25th USENIX Security …, 2016 - usenix.org
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However,
the complex nature of USB obscures the true functionality of devices from the user, and …

{USBESAFE}: An {End-Point} Solution to Protect Against {USB-Based} Attacks

A Kharraz, BL Daley, GZ Baker, W Robertson… - … on Research in Attacks …, 2019 - usenix.org
Targeted attacks via transient devices are not new. How-ever, the introduction of BadUSB
attacks has shifted the attack paradigm tremendously. Such attacks embed malicious code …

USB-watch: A generalized hardware-assisted insider threat detection framework

K Denney, L Babun, AS Uluagac - Journal of Hardware and Systems …, 2020 - Springer
Today, the USB protocol is among the most widely used protocols—mostly due to its plug-
and-play nature and number of supported devices. However, the mass-proliferation of USB …

Exploiting smart-phone usb connectivity for fun and profit

Z Wang, A Stavrou - Proceedings of the 26th Annual Computer Security …, 2010 - dl.acm.org
The Universal Serial Bus (USB) connection has become the de-facto standard for both
charging and data transfers for smart phone devices including Google's Android and Apple's …

SandUSB: An installation-free sandbox for USB peripherals

EL Loe, HC Hsiao, THJ Kim, SC Lee… - 2016 IEEE 3rd World …, 2016 - ieeexplore.ieee.org
This work investigates two emerging attacks-Human Interface Device (HID) attack and Juice
Jacking attack-that leverage USB peripherals, and proposes countermeasures to defend …

Curtain: keep your hosts away from USB attacks

J Fu, J Huang, L Zhang - … Security: 20th International Conference, ISC 2017 …, 2017 - Springer
In recent years, many attacks targeting USB were proposed. Besides spreading virus
through USB storage, attackers are tending to attack USB stacks because in most cases, any …