USB is a versatile standard defining various features to allow maximum flexibility for evices. This flexibility, by design, leads to complex device configurations, combining multiple functions into one, making it impossible for users to identify the function of a device by its looks. This can be exploited by crafting programmable USB devices, looking and behaving like an ordinary flash drive that also expose virtual network devices and other functionality to their host OS. This paper outlines such a device, exploiting several USB features to establish a rogue HTTP channel used to leak data stored on the device’s disk to an internet back end. We describe the device itself and its architecture and our conclusions and methods for dealing with ...
The BadUSB attack leverages the modification of firmware of USB devices in order to mimic the behavi...
This paper reports the results of experiments and studies involving different types of devices that ...
Recent technological innovations lead to the rise of a plethora of portable electronic devices such ...
USB is a versatile standard defining various features to allow maximum flexibility for evices. This ...
The Universal Serial Bus (USB) is the most prominent interface for connecting peripheral devices to ...
Physical security is considered an integral part of information systems security. The idea that smal...
USB is a flexible protocol that provides a lot of functions and HID functionality which is trust by ...
Malware is a serious threat for modern information technology. It is therefore vital to be able to d...
For a reliable and convenient system, it is essential to build a secure system that will be protecte...
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persis...
The Universal Serial Bus (USB) connects external devices to a host. This interface exposes the OS ke...
The Universal Serial Bus protocol was designed to be, and has become, the single standard used for i...
International audienceModern workstations and servers implicitly trust hard disks to act as well-beh...
USB is the most prevalent peripheral interface in modern computer systems and its inherent insecurit...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
The BadUSB attack leverages the modification of firmware of USB devices in order to mimic the behavi...
This paper reports the results of experiments and studies involving different types of devices that ...
Recent technological innovations lead to the rise of a plethora of portable electronic devices such ...
USB is a versatile standard defining various features to allow maximum flexibility for evices. This ...
The Universal Serial Bus (USB) is the most prominent interface for connecting peripheral devices to ...
Physical security is considered an integral part of information systems security. The idea that smal...
USB is a flexible protocol that provides a lot of functions and HID functionality which is trust by ...
Malware is a serious threat for modern information technology. It is therefore vital to be able to d...
For a reliable and convenient system, it is essential to build a secure system that will be protecte...
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persis...
The Universal Serial Bus (USB) connects external devices to a host. This interface exposes the OS ke...
The Universal Serial Bus protocol was designed to be, and has become, the single standard used for i...
International audienceModern workstations and servers implicitly trust hard disks to act as well-beh...
USB is the most prevalent peripheral interface in modern computer systems and its inherent insecurit...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
The BadUSB attack leverages the modification of firmware of USB devices in order to mimic the behavi...
This paper reports the results of experiments and studies involving different types of devices that ...
Recent technological innovations lead to the rise of a plethora of portable electronic devices such ...