1 |
Simson L. Garfinkel. "USB deserves more support," Boston Globe Online, Dec. 1995.
|
2 |
Karsten Nohl and Jakob Lell, "BadUSB - on accessories that turn evil," Black Hat USA, Aug. 2014.
|
3 |
Security Research Labs, "BadUSB - on accessories that turn evil," https://srlabs.de/blog/wp-content/uploads/2014/07/SRLabs-BadUSB-BlackHat-v1.pdf, pp. 4, Aug. 2014.
|
4 |
Trenton Henry, David Rivenburg, and Dan Stirling, "Universal serial bus device class specification for devie firmware upgrade," USB Implementers Forum, pp. 7-9, May 1999.
|
5 |
Adam Caudill and Brandon Wilson, "Making BadUSB work for you," Derbycon, Sep. 1994.
|
6 |
https://github.com/adamcaudill/Psychson/wiki/Known-Supported-Devices
|
7 |
Karsten Nohl, "BadUSB - on accessories that turn evil," POC, Nov. 2014.
|
8 |
Certificate Authority Security Council, "Code singning," https://casecurity.org/wp-content/uploads/2013/10/CASC-Code-Signing.pdf, pp. 1-6, Oct. 2013.
|
9 |
NIST, "Security requirements for cryptographic modules," FIPS PUB 140-2, May 2001.
|
10 |
http://www.wired.com/2015/02/firmware-vulnerable-hacking-can-done/
|
11 |
Choi Myeonggil and Jeong Jaehun, "A study on the policy of cryptographic module verification program," Journal of academia-industrial technology, 12(1), pp. 257, Jan. 2011.
|
12 |
Korean Agency for Technology and Standards, "Information technology - Security techniques - Security requirements for cryptographic modules," KS X ISO/IEC 19790, Dec. 2007.
|
13 |
Korean Agency for Technology and Standards, "Information technology - Security techniques - Test requirements for cryptographic modules," KS X ISO/IEC 24759, Dec. 2007.
|
14 |
http://www.scmagazineuk.com/badusb-malware-could-be-used-to-infect-icss/article/399275/
|
15 |
http://securityaffairs.co/wordpress/33765/hacking/badusb-attack-ics.html
|