• Title/Summary/Keyword: USB Device

Search Result 133, Processing Time 0.038 seconds

A Security Program To Protect against Keyboard-Emulating BadUSB (키보드를 모방하는 BadUSB를 차단하기 위한 보안 프로그램)

  • Choi, Byung-jun;Suh, Taeweon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1483-1492
    • /
    • 2016
  • Ducky USB is one of rarely-known keyboard-emulating BadUSBs. The attacking strategy using Ducky USB is taking and executing the scripted keystroke automatically whenever the USB is inserted into PC. Prior works exhibit some problems such as performance loss and additional device requirement. To solve this problem, this paper devised a countermeasure program to efficiently block the Duck USB in Windows. The experiment proves its effectiveness.

A Study of Kernel Hardening using USB Device on Linux (리눅스에서 USB를 이용한 커널 하드닝에 관한 연구)

  • Jang, Seung-Ju;Choi, Eun-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.758-761
    • /
    • 2009
  • 본 논문은 적은 비용으로 시스템 정지 현상(PANIC)을 줄일 수 있는 Kernel Hardening 기법에 대해서 연구한다. 최근 USB의 사용이 증가함에 따라 USB의 사용에 의한 시스템 정지 현상이 자주 발생하고 있다. 본 논문에서는 이러한 컴퓨터 시스템의 정지 현상을 줄이고자 USB 디바이스를 사용하여 리눅스 커널에서의 Kernel Hardening 기법에 대해 연구한다. USB와 관련된 커널 모듈을 수정하고 수정된 모듈이 정상적으로 동작하는 지 테스트를 수행하여 정상적으로 동작함을 확인하는 실험을 수행한다.

Countermeasures for BadUSB Vulnerability (BadUSB의 취약성 및 대응방안)

  • Choi, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.559-565
    • /
    • 2015
  • To defend against information leakage or malware inflow by USB memory, security technologies such as copy protection and device control have being researched and developed. However, countermeasure are insufficient despite being recognized as a fatal security-hole for BadUSB presented at the Black Hat Security Conference 2014. To solve this problem, the countermeasures for BadUSB vulnerability are proposed.

Vulnerability Analysis Method of Software-based Secure USB (소프트웨어 기반 보안 USB에 대한 취약성 분석 방법론)

  • Kim, Minho;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo;Kim, Minsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1345-1354
    • /
    • 2012
  • The modern society with the wide spread USB memory, witnesses the acceleration in the development of USB products that applied secure technology. Secure USB is protecting the data using the method as device-based access control, encryption of stored files, and etc. In terms of forensic analyst, to access the data is a lot of troubles. In this paper, we studied software-based data en/decryption technology and proposed for analysis mechanism to validation vulnerability that secured on removable storage media. We performed a vulnerability analysis for USB storage device that applied security mechanism. As a result, we found vulnerabilities that extracts a source file without a password.

An Effective Teaching Plan based on the LabVIEW by utilizing the USB type DAQ device (LabVIEW 기반의 USB방식 DAQ장비를 활용한 효과적인 수업 방안)

  • Bae, Joon-Young;Kim, Nam-Sung
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.2
    • /
    • pp.91-98
    • /
    • 2010
  • In this paper, we looked around an effective teaching plan base on the LabVIEW by utilizing the USB type DAQ device. Moreover, we have been learning the concept of control and instrumentation engineering through theory and practice classwork in the various field of engineering, come to automation engineering as well as electricity, electronic, telecommunication and computer science. In case of the best learning to understand the concept and operate the practice, we'd like to propose the application technique to make use of the PC based on LabVIEW software with USB type DAQ devices, better than to depend upon the expensive equipment as before. As a result, we hope that this technique to be considered easily accessible to understand anyone and expect distinguished applications.

  • PDF

SoQ-based Relay Transmission Protocol for Wireless USB over WiMedia D-MAC (WiMedia D-MAC 기반 Wireless USB 시스템을 위한 SoQ-based 릴레이 통신 프로토콜)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1324-1329
    • /
    • 2013
  • The WiMedia Alliance has specified a Distributed Medium Access Control (D-MAC) protocol based on UWB for high speed wireless home networks and WPANs. In this paper, firstly, the fair SoQ-based Distributed Reservation Protocol (DRP) for D-MAC is analyzed. And a novel SoQ-based relay transmission protocol is proposed to overcome DRP conflicts fast. In the proposed protocol, each device executes the Satisfaction of QoS (SoQ) time slot allocation algorithm independently. And, in order to give the loser device due to DRP conflicts another chance to maintain QoS resources, the proposed relay transmission protocol helps the device reserve another indirect link maintaining the required QoS resources via a relay node.

Design and Implementation of iSCSI Protocol Based Virtual USB Drive for Mobile Devices (모바일 장치를 위한 iSCSI 프로토콜 기반의 가상 USB 드라이브 설계 및 구현)

  • Choi, Jae-Hyun;Nam, Young Jin;Kim, JongWan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.175-184
    • /
    • 2010
  • This paper designs a virtual USB drive for mobile devices which gives an illusion of a traditional USB flash memory drive and provides capacity-free storage space over IP network. The virtual USB drive operating with a S3C2410 hardware platform and embedded linux consists of USB device driver, an iSCSI-enabled network stack, and a seamless USB/iSCSI tunneling module. For performance enhancement, it additionally provides a kernel-level seamless USB/iSCSI tunneling module and data sharing with symbol references among kernel modules. Experiments reveal that the kernel-level implementation can improve the I/O performance up to 8 percentage, as compared with the user-level implementation.

Password Based USB File Encryption Program (패스워드 기반의 USB 파일 보호 프로그램)

  • Yong, SeungLim;Choi, Young-Chul;Do, Sang-Won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.137-138
    • /
    • 2017
  • 본 논문에서는 USB 파일을 보호하기 위한 USB 파일 보호 프로그램을 설계하고 구현한다. USB 파일 암호화 프로그램은 암복호화시 패스워드를 기반으로 하여 사용자 편의성을 고려하고, USB 저장장치의 파일 각각을 패스워드 가반으로 암호화함으로써 파일들의 외부유출을 방지하여 분실 시 보안에 취약했던 USB 저장장치의 안전성을 향상시킨다.

  • PDF

Implementation of Smart USB Memory based on Bluetooth (블루투스 기반 스마트 USB 메모리 구현)

  • Kang, Byeong-gwan;Woo, Seung-heon;Yu, Hyun-ju;Ju, Haein;Lee, Ju-won;Kang, Seong-in
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.522-524
    • /
    • 2015
  • A USB memory stick became common for secondary storage Unit.. But USB memory stick has critical problems as well. Such as personal information data leakage due to easy loss of the portable device. Therefore, User increased Repurchases of USB memory stick, and damage case of personal and company information data leakage increased. In this study, to prevent such loss and stolen, we propose Smart USB memory stick based on Bluetooth. Smart USB memory stick support the security and prevent the loss.

  • PDF