[PDF][PDF] Ghosttype: The limits of using contactless electromagnetic interference to inject phantom keys into analog circuits of keyboards

Q Jiang, Y Ren, Y Long, C Yan, Y Sun… - Network and …, 2024 - researchgate.net
Keyboards are the primary peripheral input devices for various critical computer application
scenarios. This paper performs a security analysis of the keyboard sensing mechanisms and …

USB-watch: A dynamic hardware-assisted USB threat detection framework

K Denney, E Erdin, L Babun, M Vai… - Security and Privacy in …, 2019 - Springer
The USB protocol is among the most widely adopted protocols today thanks to its plug-and-
play capabilities and the vast number of devices which support the protocol. However, this …

USB-watch: A generalized hardware-assisted insider threat detection framework

K Denney, L Babun, AS Uluagac - Journal of Hardware and Systems …, 2020 - Springer
Today, the USB protocol is among the most widely used protocols—mostly due to its plug-
and-play nature and number of supported devices. However, the mass-proliferation of USB …

Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis

N Farhi, N Nissim, Y Elovici - Computers & Security, 2019 - Elsevier
Concealing malicious components within widely used USB peripherals has become a
popular attack vector utilizing social engineering techniques and exploiting users' trust in …

Time-print: Authenticating USB flash drives with novel timing fingerprints

P Cronin, X Gao, H Wang… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Universal Serial Bus (USB) ports are a ubiquitous feature in computer systems and offer a
cheap and efficient way to provide power and data connectivity between a host and …

[HTML][HTML] Duck Hunt: Memory forensics of USB attack platforms

T Thomas, M Piscitelli, BA Nahar, I Baggili - Forensic Science International …, 2021 - Elsevier
To explore the memory forensic artifacts generated by USB-based attack platforms, we
analyzed two of the most popular commercially available devices, Hak5's USB Rubber …

Badusb-c: Revisiting badusb with type-c

H Lu, Y Wu, S Li, Y Lin, C Zhang… - 2021 IEEE Security and …, 2021 - ieeexplore.ieee.org
The security of the Universal Serial Bus (USB) protocol has been paid extensive attention to
because of its wide usage. Due to the trust-by-default characteristics, USB security has …

A deep-learning-based approach to keystroke-injection payload generation

V Gurčinas, J Dautartas, J Janulevičius, N Goranin… - Electronics, 2023 - mdpi.com
Investigation and detection of cybercrimes has been in the spotlight of cybersecurity
research for as long as the topic has existed. Modern methods are required to keep up with …

Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards

AK Chillara, P Saxena, RR Maiti, M Gupta… - International Journal of …, 2024 - Springer
Due to its plug-and-play functionality and wide device support, the universal serial bus
(USB) protocol has become one of the most widely used protocols. However, this …

Making whitelisting-based defense work against badusb

H Mohammadmoradi, O Gnawali - Proceedings of the 2nd International …, 2018 - dl.acm.org
Universal serial bus (USB) devices have widespread use in different computing platforms,
including IoT gadgets, but this popularity makes them attractive targets for exploits and being …