Mouse trap: Exploiting firmware updates in {USB} peripherals

J Maskiewicz, B Ellis, J Mouradian… - 8th USENIX Workshop on …, 2014 - usenix.org
J Maskiewicz, B Ellis, J Mouradian, H Shacham
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014usenix.org
Although many users are aware of the threats that malware pose, users are unaware that
malware can infect peripheral devices. Many embedded devices support firmware update
capabilities, yet they do not authenticate such updates; this allows adversaries to infect
peripherals with malicious firmware. We present a case study of the Logitech G600 mouse,
demonstrating attacks on networked systems which are also feasible against air-gapped
systems.
Abstract
Although many users are aware of the threats that malware pose, users are unaware that malware can infect peripheral devices. Many embedded devices support firmware update capabilities, yet they do not authenticate such updates; this allows adversaries to infect peripherals with malicious firmware. We present a case study of the Logitech G600 mouse, demonstrating attacks on networked systems which are also feasible against air-gapped systems.
usenix.org
以上显示的是最相近的搜索结果。 查看全部搜索结果