Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Defending against malicious peripherals with Cinch

S Angel, RS Wahby, M Howald, JB Leners… - 25th USENIX Security …, 2016 - usenix.org
Malicious peripherals designed to attack their host computers are a growing problem.
Inexpensive and powerful peripherals that attach to plug-and-play buses have made such …

Mouse trap: Exploiting firmware updates in {USB} peripherals

J Maskiewicz, B Ellis, J Mouradian… - 8th USENIX Workshop on …, 2014 - usenix.org
Although many users are aware of the threats that malware pose, users are unaware that
malware can infect peripheral devices. Many embedded devices support firmware update …

{USB} snooping made easy: crosstalk leakage attacks on {USB} hubs

Y Su, D Genkin, D Ranasinghe, Y Yarom - 26th USENIX Security …, 2017 - usenix.org
The Universal Serial Bus (USB) is the most prominent interface for connecting peripheral
devices to computers. USB-connected input devices, such as keyboards, card-swipers and …

[PDF][PDF] Read It Twice! A Mass-Storage-Based TOCTTOU Attack.

C Mulliner, B Michéle - WOOT, 2012 - usenix.org
Consumer electronics and embedded devices often allow the installation of applications and
firmware upgrades from user-provided mass-storage devices. To protect the integrity of …

Distributed architecture to enhance systems protection against unauthorized activity via usb devices

J Oliveira, P Pinto, H Santos - Journal of Sensor and Actuator Networks, 2021 - mdpi.com
Cyberattacks exploiting Universal Serial Bus (USB) interfaces may have a high impact on
individual and corporate systems. The BadUSB is an attack where a USB device's firmware …

Insecure by design: Using human interface devices to exploit SCADA systems

G Tzokatziou, L Maglaras… - … Symposium for ICS & …, 2015 - scienceopen.com
Modern Supervisory Control and Data Acquisition (SCADA) systems which are used by the
electric utility industry to monitor and control electric power generation, transmission and …

[PDF][PDF] Threat and Vulnerability Modelling of Malicious Human Interface Devices

M Nıcho, I Sabry - The Eurasia Proceedings of Science Technology …, 2022 - epstem.net
The threats posed by malicious Human Interface Devices (HID) have greater potential for
harm owing to the inherent trust given to them by the respective Operating Systems (OS) …

Integration of kleptoware as keyboard keylogger for input recorder using teensy USB development board

SM Nasution, Y Purwanto, A Virgono… - 2014 8th International …, 2014 - ieeexplore.ieee.org
Operating a computer to perform everyday tasks is sure to require input devices. The
common human interface devices for operating a computer are mouse and keyboard. It …

[PDF][PDF] Exploiting SCADA vulnerabilities using a human interface device

G Tzokatziou, LA Maglaras, H Janicke, Y He - Int J Adv Comput Sci Appl, 2015 - Citeseer
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor
critical national infrastructure functions like electricity, gas, water and railways. Field devices …