Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.3.559

Countermeasures for BadUSB Vulnerability  

Choi, Jun (Defense Security Institute)
Abstract
To defend against information leakage or malware inflow by USB memory, security technologies such as copy protection and device control have being researched and developed. However, countermeasure are insufficient despite being recognized as a fatal security-hole for BadUSB presented at the Black Hat Security Conference 2014. To solve this problem, the countermeasures for BadUSB vulnerability are proposed.
Keywords
BadUSB; Secure USB; Firmware Hacking;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Simson L. Garfinkel. "USB deserves more support," Boston Globe Online, Dec. 1995.
2 Karsten Nohl and Jakob Lell, "BadUSB - on accessories that turn evil," Black Hat USA, Aug. 2014.
3 Security Research Labs, "BadUSB - on accessories that turn evil," https://srlabs.de/blog/wp-content/uploads/2014/07/SRLabs-BadUSB-BlackHat-v1.pdf, pp. 4, Aug. 2014.
4 Trenton Henry, David Rivenburg, and Dan Stirling, "Universal serial bus device class specification for devie firmware upgrade," USB Implementers Forum, pp. 7-9, May 1999.
5 Adam Caudill and Brandon Wilson, "Making BadUSB work for you," Derbycon, Sep. 1994.
6 https://github.com/adamcaudill/Psychson/wiki/Known-Supported-Devices
7 Karsten Nohl, "BadUSB - on accessories that turn evil," POC, Nov. 2014.
8 Certificate Authority Security Council, "Code singning," https://casecurity.org/wp-content/uploads/2013/10/CASC-Code-Signing.pdf, pp. 1-6, Oct. 2013.
9 NIST, "Security requirements for cryptographic modules," FIPS PUB 140-2, May 2001.
10 http://www.wired.com/2015/02/firmware-vulnerable-hacking-can-done/
11 Choi Myeonggil and Jeong Jaehun, "A study on the policy of cryptographic module verification program," Journal of academia-industrial technology, 12(1), pp. 257, Jan. 2011.
12 Korean Agency for Technology and Standards, "Information technology - Security techniques - Security requirements for cryptographic modules," KS X ISO/IEC 19790, Dec. 2007.
13 Korean Agency for Technology and Standards, "Information technology - Security techniques - Test requirements for cryptographic modules," KS X ISO/IEC 24759, Dec. 2007.
14 http://www.scmagazineuk.com/badusb-malware-could-be-used-to-infect-icss/article/399275/
15 http://securityaffairs.co/wordpress/33765/hacking/badusb-attack-ics.html