Publication | Closed Access
Hardware Trojan Horse Device Based on Unintended USB Channels
15
Citations
3
References
2009
Year
Unknown Venue
Hardware SecurityHardware TrojanThreat (Computer)Target Network EndpointEngineeringInformation SecurityUnintended Usb ChannelsTargeted Network EndpointInformation ForensicsUsb DevicesComputer ScienceCovert ChannelSide-channel AttackHardware Security SolutionTechnologyData SecurityCryptography
This paper discusses research activities that investigated the risk associated with USB devices. The research focused on identifying, characterizing and modelling unintended USB channels in contemporary computer systems. Such unintended channels can be used by a USB hardware Trojan horse device to create two way communications with a targeted network endpoint, thus violating the integrity and confidentiality of the data residing on the endpoint. The work was validated through the design and implementation of a proof of concept hardware Trojan horse device that uses two such unintended USB channels to successfully interact with a target network endpoint to compromise and exfiltrate data from it.
| Year | Citations | |
|---|---|---|
Page 1
Page 1