This paper reports the results of experiments and studies involving different types of devices that can implement a BadUSB scenario, for example, BadUSB, Rubber Ducky, which, when connected to a computer, impersonate a device with a Human Interface Device, emulating other devices such as a keyboard and mouse. Given the problem of the lack of management tools for detecting preliminary modifications of USB devices against attacks based on the seizure of computer control, a software and hardware system is proposed as an object of study. It is implemented programmatically in the Arduino IDE environment, and physically it is made on the Arduino Mega board with Shield, which reads the parameters of the devices. It monitors the startup of USB dev...
The USB killer is a testing device that has been marketed as having been designed to test the limits...
Recent technological innovations lead to the rise of a plethora of portable electronic devices such ...
The USB bus is the most common way of connecting peripherals to personal computers. The goal of this...
Forensics is the art of gathering evidence, which for electronics amounts to accurately recovering d...
The BadUSB attack leverages the modification of firmware of USB devices in order to mimic the behavi...
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persis...
The Universal Serial Bus protocol was designed to be, and has become, the single standard used for i...
Universal Serial Bus (USB) is a popular choice of interfacing computer systems with peripherals. Wit...
During 2014, an attack called the BadUSB attack surfaced. This attack allows the attacker to reflash...
For a reliable and convenient system, it is essential to build a secure system that will be protecte...
Part 1: Control Systems SecurityInternational audienceTraditional cyber security mechanisms, such as...
Physical security is considered an integral part of information systems security. The idea that smal...
User equipment (UE), such as smartphones, notebooks, laptops, and the like, require protection from ...
Diese Arbeit beschäftigt sich mit der Entwicklung eines Testgerätes für die sicherheitstechnische Üb...
Vhodno-izhodne naprave so vse naprave, ki komunicirajo z računalnikom. Kot že samo ime pove, so napr...
The USB killer is a testing device that has been marketed as having been designed to test the limits...
Recent technological innovations lead to the rise of a plethora of portable electronic devices such ...
The USB bus is the most common way of connecting peripherals to personal computers. The goal of this...
Forensics is the art of gathering evidence, which for electronics amounts to accurately recovering d...
The BadUSB attack leverages the modification of firmware of USB devices in order to mimic the behavi...
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persis...
The Universal Serial Bus protocol was designed to be, and has become, the single standard used for i...
Universal Serial Bus (USB) is a popular choice of interfacing computer systems with peripherals. Wit...
During 2014, an attack called the BadUSB attack surfaced. This attack allows the attacker to reflash...
For a reliable and convenient system, it is essential to build a secure system that will be protecte...
Part 1: Control Systems SecurityInternational audienceTraditional cyber security mechanisms, such as...
Physical security is considered an integral part of information systems security. The idea that smal...
User equipment (UE), such as smartphones, notebooks, laptops, and the like, require protection from ...
Diese Arbeit beschäftigt sich mit der Entwicklung eines Testgerätes für die sicherheitstechnische Üb...
Vhodno-izhodne naprave so vse naprave, ki komunicirajo z računalnikom. Kot že samo ime pove, so napr...
The USB killer is a testing device that has been marketed as having been designed to test the limits...
Recent technological innovations lead to the rise of a plethora of portable electronic devices such ...
The USB bus is the most common way of connecting peripherals to personal computers. The goal of this...