ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Low Cost Hardware Trojan horse Device based on Unintended USB channels and a Solution

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 7)

Publication Date:

Authors : ;

Page : 114-118

Keywords : Insider Threat; Hardware Trojan horse; Unintended USB channel; Human Interface Device;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Nowadays every device is becoming available as a USB device. As a result of that these devices may be used to attack a network endpoint. This paper aims at implementing a Hardware Trojan horse device which when used by a malicious insider can attack a network endpoint to steal the confidential information over unintended USB channels. Endpoint Security Solutions are available to protect the stealing of information through USB Mass Storage, USB Printer interfaces but still they have no control over the USB audio and USB keyboard interfaces. So these interfaces can be used in an unintended way to attack a network endpoint and steal the information. This paper also focuses on methodologies that can be applied to block the unintended USB channels.

Last modified: 2014-11-25 19:37:18