Loading [a11y]/accessibility-menu.js
Hardware Trojan Horse Device Based on Unintended USB Channels | IEEE Conference Publication | IEEE Xplore

Hardware Trojan Horse Device Based on Unintended USB Channels


Abstract:

This paper discusses research activities that investigated the risk associated with USB devices. The research focused on identifying, characterizing and modelling uninten...Show More

Abstract:

This paper discusses research activities that investigated the risk associated with USB devices. The research focused on identifying, characterizing and modelling unintended USB channels in contemporary computer systems. Such unintended channels can be used by a USB hardware Trojan horse device to create two way communications with a targeted network endpoint, thus violating the integrity and confidentiality of the data residing on the endpoint. The work was validated through the design and implementation of a proof of concept hardware Trojan horse device that uses two such unintended USB channels to successfully interact with a target network endpoint to compromise and exfiltrate data from it.
Date of Conference: 19-21 October 2009
Date Added to IEEE Xplore: 10 November 2009
ISBN Information:
Conference Location: Gold Coast, QLD, Australia
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada

Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ONT, Canada
Contact IEEE to Subscribe

References

References is not available for this document.