![]() ![]() While modern operating systems have ways to (PCI cards for example) meaning less attention may be paid to what tasks theyĪre doing under the user’s nose. User interaction to install on a system than other types of hardware peripheral USB devices are of special interest as they often require less The topic of malicious hardwareĬan be pretty broad, so this paper will be concentrating specifically on malicious Name just a few: backdoored routers, surreptitiously installed hosts that actĪs pivots on a network, PS/2 key loggers, etc. ![]() There are many examples of malicious hardware, to Worms, trojans, spyware, etc.), comparatively less time has been spent researching Possible extensions to the USB standardsĪ fair amount of research has gone into blocking malicious software (viruses, ![]() Tracking and scanning for malicious USB devices in Windows environmentsĥ. Locking down Windows and Linux against Malicious USB devicesģ.1 Locking down Windows Vista and Windows 7 against Malicious USB devicesĤ. Well as human practices that can help alleviate the threats posed by maliciousĢ.2 U3 thumb drives with "evil" autorun payloadsĢ.3 Why this paper will focus on the last two categoriesĢ.5 Programmable HID USB Keyboard Dongle Devicesģ. Information on how these threats can be technically detected and mitigated, as The paper will first lay out a proposed set ofĬategories for malicious USB devices, how these categories function, how theyĭiffer, and how they can be used by an attacker. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |