USB-based attacks

Attackers increasingly take advantage of innocent users who tend to use USB peripherals casually, assuming these peripherals are benign when in fact they may carry an embedded malicious payload that can be used to launch attacks. In recent years, USB peripherals have become an attractive tool for la...

Full description

Saved in:
Bibliographic Details
Published in:Computers & security Vol. 70; pp. 675 - 688
Main Authors: Nissim, Nir, Yahalom, Ran, Elovici, Yuval
Format: Journal Article
Language:English
Published: Amsterdam Elsevier Ltd 01-09-2017
Elsevier Sequoia S.A
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Attackers increasingly take advantage of innocent users who tend to use USB peripherals casually, assuming these peripherals are benign when in fact they may carry an embedded malicious payload that can be used to launch attacks. In recent years, USB peripherals have become an attractive tool for launching cyber-attacks. In this survey, we review 29 different USB-based attacks and utilize our new taxonomy to classify them into four major categories. These attacks target both individuals and organizations; utilize widely used USB peripherals, such as keyboards, mice, flash drives, smartphones etc. For each attack, we address the objective it achieves and identify the associated and vulnerable USB peripherals and hardware.
ISSN:0167-4048
1872-6208
DOI:10.1016/j.cose.2017.08.002