{USBFuzz}: A Framework for Fuzzing {USB} Drivers by Device Emulation

H Peng, M Payer - 29th USENIX Security Symposium (USENIX Security …, 2020 - usenix.org
The Universal Serial Bus (USB) connects external devices to a host. This interface exposes
the OS kernels and device drivers to attacks by malicious devices. Unfortunately, kernels …

Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints

D Song, F Hetzelt, J Kim, BB Kang, JP Seifert… - 29th USENIX Security …, 2020 - usenix.org
Kernel-mode drivers are challenging to analyze for vulnerabilities, yet play a critical role in
maintaining the security of OS kernels. Their wide attack surface, exposed via both the …

[PDF][PDF] Periscope: An effective probing and fuzzing framework for the hardware-os boundary

D Song, F Hetzelt, D Das, C Spensky, Y Na… - NDSS, 2019 - researchgate.net
The OS kernel is an attractive target for remote attackers. If compromised, the kernel gives
adversaries full system access, including the ability to install rootkits, extract sensitive …

Hardlog: Practical tamper-proof system auditing using a novel audit device

A Ahmad, S Lee, M Peinado - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Audit systems maintain detailed logs of security-related events on enterprise machines to
forensically analyze potential incidents. In principle, these logs should be safely stored in a …

[PDF][PDF] Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals.

F Xu, W Diao, Z Li, J Chen, K Zhang - NDSS, 2019 - staff.ie.cuhk.edu.hk
Bluetooth is a widely used communication technology, especially under the scenarios of
mobile computing and Internet of Things. Once paired with a host device, a Bluetooth device …

SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C

J Tian, N Scaife, D Kumar, M Bailey… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
USB-based attacks have increased in complexity in recent years. Modern attacks now
incorporate a wide range of attack vectors, from social engineering to signal injection. To …

Fuzz The Power: Dual-role State Guided Black-box Fuzzing for {USB} Power Delivery

K Kim, S Kim, KRB Butler, A Bianchi, R Kennell… - 32nd USENIX Security …, 2023 - usenix.org
USB Power Delivery (USBPD) is a state-of-the-art charging protocol for advanced power
supply. Thanks to its high volume of power supply, it has been widely adopted by consumer …

Lbm: A security framework for peripherals within the linux kernel

DJ Tian, G Hernandez, JI Choi, V Frost… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Modern computer peripherals are diverse in their capabilities and functionality, ranging from
keyboards and printers to smartphones and external GPUs. In recent years, peripherals …

Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU

M Alex, S Vargaftik, G Kupfer, B Pismeny… - Proceedings of the …, 2021 - dl.acm.org
Direct memory access (DMA) renders a system vulnerable to DMA attacks, in which I/O
devices access memory regions not intended for their use. Hardware input-output memory …

{USB} snooping made easy: crosstalk leakage attacks on {USB} hubs

Y Su, D Genkin, D Ranasinghe, Y Yarom - 26th USENIX Security …, 2017 - usenix.org
The Universal Serial Bus (USB) is the most prominent interface for connecting peripheral
devices to computers. USB-connected input devices, such as keyboards, card-swipers and …