Главная
Study mode:
on
1
Intro
2
Universal Serial Bus
3
Universal Security Breach
4
Attacks: Human Layer
5
Attacks: Application Layer
6
Attacks: Transport Layer
7
Attacks: Physical Layer
8
Attacks: Summary
9
Defenses: Human Layer
10
Defenses: Application Layer
11
Defenses: Transport Layer
12
Defenses: Physical Layer
13
Defenses: Summary
14
Systematization
15
USB Device Changes
16
USB Type-C Authentication Protocol
17
Formal Verification
18
Conclusion
Description:
Explore a comprehensive analysis of USB security vulnerabilities and defenses in this 18-minute conference talk presented at the 2018 IEEE Symposium on Security & Privacy. Delve into the evolution of USB-based attacks, examining their increasing complexity and diverse attack vectors. Gain insights into the fragmented defensive measures developed by the security community in response to these threats. Discover a systematic categorization of USB attacks and defenses, identifying offensive and defensive primitives across various communication layers within the USB ecosystem. Learn about the trust-by-default nature of USB and how attacks often transcend different software stack layers. Examine the first formal verification of the USB Type-C Authentication specification, uncovering fundamental flaws in its design. Conclude with an exploration of future research directions aimed at enhancing USB security and ensuring safer computing experiences.

Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C

IEEE
Add to list
0:00 / 0:00