USB-watch: A generalized hardware-assisted insider threat detection framework

K Denney, L Babun, AS Uluagac - Journal of Hardware and Systems …, 2020 - Springer
Today, the USB protocol is among the most widely used protocols—mostly due to its plug-
and-play nature and number of supported devices. However, the mass-proliferation of USB …

USB-watch: A dynamic hardware-assisted USB threat detection framework

K Denney, E Erdin, L Babun, M Vai… - Security and Privacy in …, 2019 - Springer
The USB protocol is among the most widely adopted protocols today thanks to its plug-and-
play capabilities and the vast number of devices which support the protocol. However, this …

Dynamically detecting usb attacks in hardware: Poster

K Denney, E Erdin, L Babun, AS Uluagac - Proceedings of the 12th …, 2019 - dl.acm.org
Malicious USB devices can disguise themselves as benign devices (eg, keyboard, mouse,
etc.) to insert malicious commands on end devices. Advanced software-based detection …

OS independent and hardware-assisted insider threat detection and prevention framework

E Erdin, H Aksu, S Uluagac, M Vai… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
Governmental and military institutions harbor critical infrastructure and highly confidential
information. Although institutions are investing a lot for protecting their data and assets from …

[PDF][PDF] USB-undermining security barriers

A Davis - Black Hat Briefings, 2011 - cs.uno.edu
USB ports are everywhere, from laptops and phones to TVs and even microwave ovens.
They provide a convenient, reasonably fast interconnect that consumers are familiar with …

Making {USB} great again with {USBFILTER}

DJ Tian, N Scaife, A Bates, K Butler… - 25th USENIX Security …, 2016 - usenix.org
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However,
the complex nature of USB obscures the true functionality of devices from the user, and …

Defending against malicious USB firmware with GoodUSB

DJ Tian, A Bates, K Butler - Proceedings of the 31st Annual Computer …, 2015 - dl.acm.org
USB attacks are becoming more sophisticated. Rather than using USB devices solely as a
delivery mechanism for host-side exploits, attackers are targeting the USB stack itself …

Usblock: Blocking usb-based keypress injection attacks

S Neuner, AG Voyiatzis, S Fotopoulos… - Data and Applications …, 2018 - Springer
Abstract The Universal Serial Bus (USB) is becoming a prevalent attack vector. Rubber
Ducky and BadUSB are two recent classes of a whole spectrum of attacks carried out using …

[PDF][PDF] Leveraging USB to Establish Host Identity Using Commodity Devices.

A Bates, R Leonard, H Pruse, D Lowd, KRB Butler - NDSS, 2014 - ix.cs.uoregon.edu
Determining a computer's identity is a challenge of critical importance to users wishing to
ensure that they are interacting with the correct system; it is also extremely valuable to …

Protecting against malicious bits on the wire: Automatically generating a USB protocol parser for a production kernel

PC Johnson, S Bratus, SW Smith - … of the 33rd Annual Computer Security …, 2017 - dl.acm.org
Recent efforts to harden hosts against malicious USB devices have focused on the higher
layers of the protocol. We present a domain-specific language (DSL) to create a bit-level …