Abstract:
This paper discusses research activities that investigated the risk associated with USB devices. The research focused on identifying, characterizing and modelling uninten...Show MoreMetadata
Abstract:
This paper discusses research activities that investigated the risk associated with USB devices. The research focused on identifying, characterizing and modelling unintended USB channels in contemporary computer systems. Such unintended channels can be used by a USB hardware Trojan horse device to create two way communications with a targeted network endpoint, thus violating the integrity and confidentiality of the data residing on the endpoint. The work was validated through the design and implementation of a proof of concept hardware Trojan horse device that uses two such unintended USB channels to successfully interact with a target network endpoint to compromise and exfiltrate data from it.
Date of Conference: 19-21 October 2009
Date Added to IEEE Xplore: 10 November 2009
ISBN Information:
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada