The BadUSB attack leverages the modification of firmware of USB devices in order to mimic the behaviour of a keyboard or a mouse and send malicious commands to the host. This is a new and dreadful threat for any organization. Current countermeasures either require special USB devices or ask the user to decide if the device can be used. We propose a new approach that, before allowing the device to be used, forces the user to interact with it physically, to ensure that a real human-interface device is attached. Our implementation is hardware-based and, hence, can be used with any host, comprising embedded devices, and also during boot, i.e., before any operating system is running. Our approach does not require any special feature from USB devices.

Griscioli, F., Pizzonia, M., Sacchetti, M. (2016). USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction. In 14th Annual Conference on Privacy, Security and Trust (PST) (pp.493-496). IEEE [10.1109/PST.2016.7907004].

USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction

Griscioli, Federico;PIZZONIA, MAURIZIO;Sacchetti, Marco
2016-01-01

Abstract

The BadUSB attack leverages the modification of firmware of USB devices in order to mimic the behaviour of a keyboard or a mouse and send malicious commands to the host. This is a new and dreadful threat for any organization. Current countermeasures either require special USB devices or ask the user to decide if the device can be used. We propose a new approach that, before allowing the device to be used, forces the user to interact with it physically, to ensure that a real human-interface device is attached. Our implementation is hardware-based and, hence, can be used with any host, comprising embedded devices, and also during boot, i.e., before any operating system is running. Our approach does not require any special feature from USB devices.
2016
978-1-5090-4379-8
Griscioli, F., Pizzonia, M., Sacchetti, M. (2016). USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction. In 14th Annual Conference on Privacy, Security and Trust (PST) (pp.493-496). IEEE [10.1109/PST.2016.7907004].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11590/317088
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 13
  • ???jsp.display-item.citation.isi??? 0
social impact