Preview

Philosophical Problems of IT & Cyberspace (PhilIT&C)

Advanced search

«THE ACHILLES HEEL» OF USB-DEVICES: ATTACK AND DEFENSE

https://doi.org/10.17726/philIT.2015.9.1.4.491

Abstract

The article is devoted to vulnerability, which can be found in hardware and software devices with USB interface. Today, almost any computer peripherals including storage devices, ranging from flash storage device and ending with the most complex medical devices, is connected via USB, also a huge variety of devices use USB connector to charge the internal battery. Currently, the versatility of the USB interface is the vulnerability of the computers and devices that support it. The article describes the current use of the USB interface, the method by which the computer recognizes the device type and its purpose. Common models of vulnerable controllers among USB storage devices are identified. Some of the attack types using this vulnerability and BadUSB infections are described. The way to create an infected USB device is provided. Paper also offers security options for devices: hardware and software means of protection from infection, starting with simple programs, such as “USB Security” and finishing with software for complex security, such as «Secret Net», «Guardian NT», «Dallas Lock». We also describe hardware protection with a device, which disables the data bus or disconnects USB. In addition, we also consider alternative storage media - encrypted and secure USB flash drives.

About the Authors

P. N. Polezhaev
Orenburg State University
Russian Federation


A. K. Malakhov
Orenburg State University
Russian Federation


A. M. Sagitov
Orenburg State University
Russian Federation


References

1. Васильков А. Bad USB - как новая атака реализована в разных устройствах [Электронный ресурс]. Режим доступа: http://www.computerra. ru/108106/bad-usb-on-some-devices

2. Киви Б. Чума на ваши USB [Электронный ресурс]. Режим доступа: http://www.3dnews.ru/825348

3. Jan Axelson. USB Mass Storage // Lakeview Research. 2006. P. 277-289.

4. Агуров П. Интерфейс USB. Практика использования и программирования. СПб.: БХВ-Петербург, 2006. - 624 с.

5. BadUSB Exposure [Electronic resource]. Access mode: https:// opensource.srlabs.de/projects/badusb.

6. Уязвимость BadUSB на практике [Электронный ресурс]. Режим доступа: https://dmyt.ru/forum/viewtopic.php?t=383.

7. Средства защиты информации и где деготь [Электронный ресурс]. Режим доступа: http://habrahabr.ru/post/134861


Review

For citations:


Polezhaev P.N., Malakhov A.K., Sagitov A.M. «THE ACHILLES HEEL» OF USB-DEVICES: ATTACK AND DEFENSE. Philosophical Problems of IT & Cyberspace (PhilIT&C). 2015;(1):106-117. (In Russ.) https://doi.org/10.17726/philIT.2015.9.1.4.491

Views: 158


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2305-3763 (Online)