SandUSB: An installation-free sandbox for USB peripherals

EL Loe, HC Hsiao, THJ Kim, SC Lee… - 2016 IEEE 3rd World …, 2016 - ieeexplore.ieee.org
This work investigates two emerging attacks-Human Interface Device (HID) attack and Juice
Jacking attack-that leverage USB peripherals, and proposes countermeasures to defend …

[PDF][PDF] USB-undermining security barriers

A Davis - Black Hat Briefings, 2011 - cs.uno.edu
USB ports are everywhere, from laptops and phones to TVs and even microwave ovens.
They provide a convenient, reasonably fast interconnect that consumers are familiar with …

Plug and power: Fingerprinting usb powered peripherals via power side-channel

R Spolaor, H Liu, F Turrin, M Conti… - IEEE INFOCOM 2023 …, 2023 - ieeexplore.ieee.org
The literature and the news regularly report cases of exploiting Universal Serial Bus (USB)
devices as attack tools for malware injections and private data exfiltration. To protect against …

[PDF][PDF] Leveraging USB to Establish Host Identity Using Commodity Devices.

A Bates, R Leonard, H Pruse, D Lowd, KRB Butler - NDSS, 2014 - ix.cs.uoregon.edu
Determining a computer's identity is a challenge of critical importance to users wishing to
ensure that they are interacting with the correct system; it is also extremely valuable to …

{USBESAFE}: An {End-Point} Solution to Protect Against {USB-Based} Attacks

A Kharraz, BL Daley, GZ Baker, W Robertson… - … on Research in Attacks …, 2019 - usenix.org
Targeted attacks via transient devices are not new. How-ever, the introduction of BadUSB
attacks has shifted the attack paradigm tremendously. Such attacks embed malicious code …

Inner conflict: How smart device components can cause harm

O Shwartz, A Cohen, A Shabtai, Y Oren - Computers & Security, 2020 - Elsevier
Mobile smart devices are built of smaller components that are often fabricated by third-
parties, and not by the device manufacturers themselves. Components such as sensors …

[PDF][PDF] Hardware-based Cyber Threats.

T Alves, TH Morris - ICISSP, 2018 - academia.edu
During the last decade, cyber-security experts have been trying to mitigate attacks against
computer networks and software. After the internet, the proliferation of thousands of virus …

OS independent and hardware-assisted insider threat detection and prevention framework

E Erdin, H Aksu, S Uluagac, M Vai… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
Governmental and military institutions harbor critical infrastructure and highly confidential
information. Although institutions are investing a lot for protecting their data and assets from …

Firmusb: Vetting usb device firmware using domain informed symbolic execution

G Hernandez, F Fowze, D Tian, T Yavuz… - Proceedings of the 2017 …, 2017 - dl.acm.org
The USB protocol has become ubiquitous, supporting devices from high-powered
computing devices to small embedded devices and control systems. USB's greatest feature …

[引用][C] BadUSB 2.0: USB man in the middle attacks

D Kierznowski - Retrieved from RoyalHolloway, 2016