Today, the USB protocol is among the most widely used protocols—mostly due to its plug- and-play nature and number of supported devices. However, the mass-proliferation of USB …
Malicious USB devices can disguise themselves as benign devices (eg, keyboard, mouse, etc.) to insert malicious commands on end devices. Advanced software-based detection …
Governmental and military institutions harbor critical infrastructure and highly confidential information. Although institutions are investing a lot for protecting their data and assets from …
Abstract The Universal Serial Bus (USB) is becoming a prevalent attack vector. Rubber Ducky and BadUSB are two recent classes of a whole spectrum of attacks carried out using …
USB ports are everywhere, from laptops and phones to TVs and even microwave ovens. They provide a convenient, reasonably fast interconnect that consumers are familiar with …
EL Loe, HC Hsiao, THJ Kim, SC Lee… - 2016 IEEE 3rd World …, 2016 - ieeexplore.ieee.org
This work investigates two emerging attacks-Human Interface Device (HID) attack and Juice Jacking attack-that leverage USB peripherals, and proposes countermeasures to defend …
Z Wang, A Stavrou - Proceedings of the 26th Annual Computer Security …, 2010 - dl.acm.org
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple's …
M Kang, H Saiedian - Information Security Journal: A Global …, 2017 - Taylor & Francis
ABSTRACT Universal Serial Bus (USB) is a popular choice of interfacing computer systems with peripherals. With the increasing support of modern operating systems, it is now truly …
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However, the complex nature of USB obscures the true functionality of devices from the user, and …