期刊文献+

STM32微控制器的badUSB防护设备

Protecting Device for badUSB Based on STM32 Microcontroller
下载PDF
导出
摘要 Bad Universal Serial Bus(badUSB)是一种利用Universal Serial Bus(USB)接口来攻击计算机的设备,由于其伪装成正常的计算机USB外设,杀毒软件的防护对其没有任何作用,因此是一种极难防御的攻击手段。本文设计了一种利用微控制器USB主机来探测防御badUSB的设备,此设备成本低、体积小、安全性高,而且不影响USB通信速度。 Bad Universal Serial Bus(badUSB)is a kind of device to attack computers by Universal Serial Bus(USB)port.It can camouflage as a normal USB device.The computer protective measure by anti-virus software is invalid.The attack from badUSB is very difficult to block.This paper introduces and verifies a device to block the badUSB by micro-controller USB host.The device is low-cost,small volume and highly safe,and the communication bandwidth of USB port is normal.
作者 胡金亮 陈家刚 Hu Jinliang;Chen Jiagang(Wireless Product Operation Division,Shanghai ZTE Corporation,Shanghai 201203,China)
出处 《单片机与嵌入式系统应用》 2023年第9期70-73,共4页 Microcontrollers & Embedded Systems
关键词 badUSB STM32F405RG 信息安全 TS3USB221 badUSB STM32F405RG information security TS3USB221
  • 相关文献

参考文献3

二级参考文献13

  • 1Clark J, Leblanc S, Knight S. Compromise through USB-based Hardware Trojan Horse device [J]. Future Generation Computer Systems(S0167-739X), 2011, 27(5): 555-563.
  • 2Butler K R B, McLaughlin S E, McDaniel P D. Kells: a protection framework for portable data [C]// Proceedings of the 26th Annual Computer Security Applications Conference. USA: ACM, 2010:231-240.
  • 3Yang F, Wu T, Chin S, et al. A secure control protocol for USB mass storage devices [J]. IEEE Transactions on Consumer Electronics (S0098-3063), 2010, 56(4): 2239-2343.
  • 4S K Karsten Nohl, J Lell. BadUSB-On accessories that turn evil [Z/OL]. (2014-07-15) [2015-04-30]. https://srlabs.de/blog/wp-content/uploads/2014/07/SRLab s-BadUSB-BlackHat-vl.pdf. 2014.
  • 5Barral D Dewey. Plug and root, The USB Key to the Kingdom [Z/OL]. (2005-07-27) [2015-04-30]. http://www.blackhat.com/presentations/bh-usa-05/BH_U S 05-BarraU-Dewey.pdf. 2005.
  • 6Wang A, Li Z, Yang X, et al. A New Security Problem of USB: Monitoring Cable Attack and Countermeasures [C]// Proceedings of the 2012 International Conference on Information Technology and Software Engineering. Heidelberg,Germany: Springer Berlin, 2012:129-137.
  • 7Jodeit M, Johns M. USB Device Drivers: A Stepping Stone into your Kernel [C]// Computer Network Defense (EC2ND), 2010 European Conference on. Los Alamitos: TEEE. 2010: 46-52.
  • 8Schumilo S, Spenneberg R. Don't trust your USB! How to find bugs in USB device drivers [Z/OL]. (2014-09-28) [2015-04-30].https ://www.blackhat.com/docs/eu- 14/mate rials/eu-14-Schumilo-Dont-Trust-Your-USB-How-To-Fi nd-Bugs-In-USB-Device-Drivers-wp.pdf. 2014.
  • 9http://wenku.baidu.com/link?url=zopFu9pIDb2vzFkxzysxxw5IGu36E-QZkaRiPl6QD9MnP8QpbSAY8VlDUEJfytuCaAvZvslrq366xDJPWDYLq0UacpvVuvlpaTVGJY5saUy.2016-2-24.
  • 10http://baike.baidu.corn/link?url=7Qry90rlnzcofB9gltssAINt4VzN01hLRw-YUNBR6xZI-19bXlbTITWKrDBUPQGt5DiyMj5mvOFg-MqHyYVJH4ttUOWZaDASDImY2aYpN06nVHxlLidZ3Jd5cC01E9nSjuhh3HhpatdbhNgrqtttlSba.2015-2-9.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部