Dynamically detecting usb attacks in hardware: Poster

K Denney, E Erdin, L Babun, AS Uluagac - Proceedings of the 12th …, 2019 - dl.acm.org
Malicious USB devices can disguise themselves as benign devices (eg, keyboard, mouse,
etc.) to insert malicious commands on end devices. Advanced software-based detection …

Usbesafe: Applying one class svm for effective usb event anomaly detection

BL Daley - … , College ofComputer and Information Systems Boston …, 2016 - apps.dtic.mil
Increased use of transient devices such as wireless keyboards, webcams, and flash storage
in the last ten years has drastically increased the surface area on which attackers can target …

Usb-watch: a dynamic hardware-assisted usb threat detection framework

K Denney, E Erdin, L Babun, M Vai… - Security and Privacy in …, 2019 - Springer
The USB protocol is among the most widely adopted protocols today thanks to its plug-and-
play capabilities and the vast number of devices which support the protocol. However, this …

USB-watch: A generalized hardware-assisted insider threat detection framework

K Denney, L Babun, AS Uluagac - Journal of Hardware and Systems …, 2020 - Springer
Today, the USB protocol is among the most widely used protocols—mostly due to its plug-
and-play nature and number of supported devices. However, the mass-proliferation of USB …

Defending against malicious USB firmware with GoodUSB

DJ Tian, A Bates, K Butler - Proceedings of the 31st Annual Computer …, 2015 - dl.acm.org
USB attacks are becoming more sophisticated. Rather than using USB devices solely as a
delivery mechanism for host-side exploits, attackers are targeting the USB stack itself …

Usbips Framework: Protecting Hosts from Malicious Usb Peripherals

CY Wang, FH Hsu - Available at SSRN 4847047 - papers.ssrn.com
USB-based attacks have increased in complexity in recent years. Modern attacks
incorporate a wide range of attack vectors, from social engineering to signal injection. The …

[PDF][PDF] Plug and prey: Malicious USB devices

A Crenshaw - Proceedings of ShmooCon, 2011 - irongeek.com
This paper is meant as an overview of malicious USB devices. The paper will first lay out a
proposed set of categories for malicious USB devices, how these categories function, how …

USB-based attacks

N Nissim, R Yahalom, Y Elovici - Computers & Security, 2017 - Elsevier
Attackers increasingly take advantage of innocent users who tend to use USB peripherals
casually, assuming these peripherals are benign when in fact they may carry an embedded …

A comprehensive survey on hardware-assisted malware analysis and primitive techniques

EP Kumar, S Priyanka - Computer Networks, 2023 - Elsevier
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …

[HTML][HTML] To (US) Be or Not to (US) Be: Discovering Malicious USB Peripherals through Neural Network-Driven Power Analysis

KA Koffi, C Smiliotopoulos, C Kolias, G Kambourakis - Electronics, 2024 - mdpi.com
Nowadays, The Universal Serial Bus (USB) is one of the most adopted communication
standards. However, the ubiquity of this technology has attracted the interest of attackers …