USB-based attacks

N Nissim, R Yahalom, Y Elovici - Computers & Security, 2017 - Elsevier
Attackers increasingly take advantage of innocent users who tend to use USB peripherals
casually, assuming these peripherals are benign when in fact they may carry an embedded …

Exploiting smart-phone usb connectivity for fun and profit

Z Wang, A Stavrou - Proceedings of the 26th Annual Computer Security …, 2010 - dl.acm.org
The Universal Serial Bus (USB) connection has become the de-facto standard for both
charging and data transfers for smart phone devices including Google's Android and Apple's …

Defending against malicious USB firmware with GoodUSB

DJ Tian, A Bates, K Butler - Proceedings of the 31st Annual Computer …, 2015 - dl.acm.org
USB attacks are becoming more sophisticated. Rather than using USB devices solely as a
delivery mechanism for host-side exploits, attackers are targeting the USB stack itself …

The reality of risks from consented use of USB devices

M Al-Zarouni - 2006 - ro.ecu.edu.au
Physical security is considered an integral part of information systems security. The idea that
small devices pose a security threat for enterprises is well established. On the other hand …

Universal serial bus based software attacks and protection solutions

DV Pham, A Syed, MN Halgamuge - digital investigation, 2011 - Elsevier
Information security risks associated with Universal Serial Bus (USB) storage devices have
been serious issues since 2003, which marked the wide adoption of USB technologies in …

SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C

J Tian, N Scaife, D Kumar, M Bailey… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
USB-based attacks have increased in complexity in recent years. Modern attacks now
incorporate a wide range of attack vectors, from social engineering to signal injection. To …

[PDF][PDF] Optimizing windows security features to block malware and hack tools on USB storage devices

DV Pham, MN Halgamuge… - Progress in …, 2010 - sunshinecoast-loco.angelfire.com
Malware replicating via USB storage devices including worms, virus, Trojan horses and
other malicious codes together with USB based hack tools such as Pod Slurp and USB …

Making {USB} great again with {USBFILTER}

DJ Tian, N Scaife, A Bates, K Butler… - 25th USENIX Security …, 2016 - usenix.org
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However,
the complex nature of USB obscures the true functionality of devices from the user, and …

Mouse trap: Exploiting firmware updates in {USB} peripherals

J Maskiewicz, B Ellis, J Mouradian… - 8th USENIX Workshop on …, 2014 - usenix.org
Although many users are aware of the threats that malware pose, users are unaware that
malware can infect peripheral devices. Many embedded devices support firmware update …

Charging me and I know your secrets! Towards juice filming attacks on smartphones

W Meng, WH Lee, SR Murali… - Proceedings of the 1st …, 2015 - dl.acm.org
Smartphones such as Android phones and iPhones are widely adopted worldwide and the
number of smartphone users has increased dramatically. With the popularity of …