News Updates Thursday 26th Dec 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Unintentional use of USB Channels and Protection


Author : Pravin Phule and Rekha Kulkarni

Pages : 288-299
Download PDF
Abstract

Protecting an organization against the information leakage is a big task, especially when the attacker is an insider. This paper covers an insider attack based on Unintentional use of USB channels. Endpoint Protections are available to guard against the leakage of information over USB Mass Storage and USB Printer interfaces but they fail to keep watch on flow of data over USB Human Interface Devices such as USB speaker, USB keyboard and USB mouse etc. Operating system allows USB device to identify itself as any USB device. To exploit this vulnerability a Hardware Trojan horse device is developed which can identify itself as USB audio device or USB Keyboard device and make Unintentional use of USB channels to steal the data. This paper also gives a possible protection scheme to detect and block the stealing of data over Unintended USB Channels.

Keywords: Hardware Trojan horse, Protection, USB Channels, USB Security

Article published in International Journal of Current Engineering and Technology, Vol.5, No.1 (Feb-2015)

 

Call for Papers
  1. IJCET- Current Issue
  2. Issues are published in Feb, April, June, Aug, Oct and Dec
  3. DOI is given to all articles
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved