USB ports are everywhere, from laptops and phones to TVs and even microwave ovens. They provide a convenient, reasonably fast interconnect that consumers are familiar with …
The literature and the news regularly report cases of exploiting Universal Serial Bus (USB) devices as attack tools for malware injections and private data exfiltration. To protect against …
Determining a computer's identity is a challenge of critical importance to users wishing to ensure that they are interacting with the correct system; it is also extremely valuable to …
Targeted attacks via transient devices are not new. How-ever, the introduction of BadUSB attacks has shifted the attack paradigm tremendously. Such attacks embed malicious code …
Mobile smart devices are built of smaller components that are often fabricated by third- parties, and not by the device manufacturers themselves. Components such as sensors …
During the last decade, cyber-security experts have been trying to mitigate attacks against computer networks and software. After the internet, the proliferation of thousands of virus …
Governmental and military institutions harbor critical infrastructure and highly confidential information. Although institutions are investing a lot for protecting their data and assets from …
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature …