USB-watch: A dynamic hardware-assisted USB threat detection framework

K Denney, E Erdin, L Babun, M Vai… - Security and Privacy in …, 2019 - Springer
The USB protocol is among the most widely adopted protocols today thanks to its plug-and-
play capabilities and the vast number of devices which support the protocol. However, this …

USB-watch: A generalized hardware-assisted insider threat detection framework

K Denney, L Babun, AS Uluagac - Journal of Hardware and Systems …, 2020 - Springer
Today, the USB protocol is among the most widely used protocols—mostly due to its plug-
and-play nature and number of supported devices. However, the mass-proliferation of USB …

Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards

AK Chillara, P Saxena, RR Maiti, M Gupta… - International Journal of …, 2024 - Springer
Due to its plug-and-play functionality and wide device support, the universal serial bus
(USB) protocol has become one of the most widely used protocols. However, this …

Dynamically detecting usb attacks in hardware: Poster

K Denney, E Erdin, L Babun, AS Uluagac - Proceedings of the 12th …, 2019 - dl.acm.org
Malicious USB devices can disguise themselves as benign devices (eg, keyboard, mouse,
etc.) to insert malicious commands on end devices. Advanced software-based detection …

Implementation of a host-based intrusion detection system for avionic applications

A Damien, M Marcourt, V Nicomette… - 2019 IEEE 24th …, 2019 - ieeexplore.ieee.org
Today, aircraft are protected by strong safety properties, qualified operators and process-
based security measures. However, considering the recent evolution of in-flight services …

[PDF][PDF] USB-Bouncer: A Hardware Based Approach to Nullify Unknown USB Device Based Attacks on Windows Machines

T Kumarage, C Attanayake… - ACCELERATING …, 2023 - researchgate.net
ABSTRACT The Universal Serial Bus (USB) can be considered as one of the main
mechanisms of connecting external peripherals to the computers. External hard drives and …

Real time detection of metric baseline behavior change

R Fettaya, R Lemberg, L Yaniv - US Patent 11,714,695, 2023 - Google Patents
Example aspects include techniques for real-time detection of metric baseline behavior
change. These techniques may include generating a reference distance signature based on …

A Hardware-Assisted Insider Threat Detection and Prevention Framework

KW Denney - 2019 - digitalcommons.fiu.edu
Today, the USB protocol is among the most widely used protocols. However, the mass-
proliferation of USB has led to a threat vector wherein USB devices are assumed innocent …