A Low Cost Hardware Trojan horse Device based on Unintended USB channels and a Solution
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 7)Publication Date: 2012-01-26
Authors : Pravin Phule;
Page : 114-118
Keywords : Insider Threat; Hardware Trojan horse; Unintended USB channel; Human Interface Device;
Abstract
Nowadays every device is becoming available as a USB device. As a result of that these devices may be used to attack a network endpoint. This paper aims at implementing a Hardware Trojan horse device which when used by a malicious insider can attack a network endpoint to steal the confidential information over unintended USB channels. Endpoint Security Solutions are available to protect the stealing of information through USB Mass Storage, USB Printer interfaces but still they have no control over the USB audio and USB keyboard interfaces. So these interfaces can be used in an unintended way to attack a network endpoint and steal the information. This paper also focuses on methodologies that can be applied to block the unintended USB channels.
Other Latest Articles
- “Más ganados que frutos”. La evolución de la tenencia de la tierra en Hatoviejo (Bello), Antioquia, siglos XVII a XVIII
- An efficient Support Vector Clustering with combined core outlier and boundary value for pre-processing of data
- Prácticas sociales y control territorial en el Caribe Colombiano (1750-1800). El caso del contrabando en la península de la Guajira
- Implementation of Plasmonics in VLSI
- Los giros en la Historia: función social de la historia y posmodernidad, un debate que no cesa
Last modified: 2014-11-25 19:37:18