메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-8

Hardware Trojan Horse device based on unintended USB channels

Author keywords

[No Author keywords available]

Indexed keywords

PROOF OF CONCEPT; RESEARCH ACTIVITIES; TROJAN HORSE; TWO WAY COMMUNICATIONS; USB DEVICES;

EID: 72849124307     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2009.48     Document Type: Conference Paper
Times cited : (12)

References (20)
  • 1
    • 72849120451 scopus 로고    scopus 로고
    • USB Implementers Forum, "USB 2.0 Specification," 2001, http://www.usb.org/developers/docs.
    • (2001) USB 2.0 Specification
  • 3
    • 79951857377 scopus 로고    scopus 로고
    • -, "Social-engineering employees," 2007, http://www. darkreading.com/document.asp?doc\id=140433.
    • (2007) Social-engineering employees
  • 6
    • 72849127283 scopus 로고    scopus 로고
    • J. Clark, An examination of endpoint security methods to regulate USB flash drives use, Royal Military College of Canada, M.A.Sc. Depth Research Paper, Oct. 2007.
    • J. Clark, "An examination of endpoint security methods to regulate USB flash drives use," Royal Military College of Canada, M.A.Sc. Depth Research Paper, Oct. 2007.
  • 7
    • 72849106509 scopus 로고    scopus 로고
    • homepage, 2009
    • DeviceLockInc., "Devicelock homepage," 2009, http://www.devicelock.com.
    • Devicelock
    • DeviceLockInc1
  • 9
    • 72849149006 scopus 로고    scopus 로고
    • Plug and Root
    • the USB Key to the Kingdom
    • D. Barral and D. Dewey, ""Plug and Root", the USB Key to the Kingdom," 2005, http://www.blackhat.com/presentations/bh-usa-05/BH\US\ 05-Barrall-Dewey.pdf.
    • (2005)
    • Barral, D.1    Dewey, D.2
  • 12
    • 72849129906 scopus 로고    scopus 로고
    • Common Criteria Recognition Agreement, Common criteria for information technology security evaluation, version 2.3, 2005
    • Common Criteria Recognition Agreement, "Common criteria for information technology security evaluation, version 2.3," 2005, http://www.commoncriteriaportal.org/thecc.html.
  • 13
    • 72849110035 scopus 로고    scopus 로고
    • PLX Technology, home page, 2008
    • PLX Technology, "Net2280 home page," 2008, http://www.plxtech. com/products/net2000/net2280.asp.
    • Net2280
  • 15
    • 72849109800 scopus 로고    scopus 로고
    • Homepage, 2009
    • HHDSoftware, "USB Monitor Profession Homepage," 2009, http://www.hhdsoftware.com/Products/home/usb-monitor-pro.html.
    • USB Monitor Profession
  • 17
    • 72849125068 scopus 로고    scopus 로고
    • Microsoft, Windows Media: WAVEFORMATEXTEN-SIBLE, 2008, http://msdn.microsoft.com/en-us/library/aa391547(VS.85).aspx.
    • Microsoft, "Windows Media: WAVEFORMATEXTEN-SIBLE," 2008, http://msdn.microsoft.com/en-us/library/aa391547(VS.85).aspx.
  • 19
    • 72849111513 scopus 로고    scopus 로고
    • Tarako, "EXE2VBS," 2003, http://www.haxorcitos.com/ficheros. html.
    • (2003) EXE2VBS
    • Tarako1
  • 20
    • 50249095722 scopus 로고    scopus 로고
    • Predictable design of network-based covert communication systems, in Security and Privacy, 2008. SP 2008
    • May
    • R. Smith and G. Scott Knight, "Predictable design of network-based covert communication systems," in Security and Privacy, 2008. SP 2008. IEEE Symposium on, May 2008, pp. 311-321.
    • (2008) IEEE Symposium on , pp. 311-321
    • Smith, R.1    Scott Knight, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.