Usb

Full list of my blog posts, publications and talks in category USB.
Filter by
blurry image for loading
blurry image for loading
hacking
Attacking encrypted USB keys the hard(ware) way
Attacking encrypted USB keys the hard(ware) way
Talk Black Hat USA 2017
In this talk, we will present our methodology to assess secure USB devices both from the software and the hardware perspectives.
blurry image for loading
blurry image for loading
hacking
Does dropping usb drives really work?
Does dropping usb drives really work?
Talk Black Hat 2016
Blackhat presentation on the effectivness of USB drop attacks
blurry image for loading
blurry image for loading
hacking
What are malicious usb keys and how to create a realistic one?
What are malicious usb keys and how to create a realistic one?
Blog post Aug 2016
This blog post shows how to create a reliable and realistic-looking malicious USB key that can be used in a drop attack.
blurry image for loading
blurry image for loading
hacking
Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots
Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots
Blog post Apr 2016
As an experiment we dropped nearly 300 USB sticks on the UIUC campus to assess if USB drop attacks work and see if concerns about USB security were justified. We found out that at least 48% of the drive were plugged. This blog post summarizes how we ran the study, highlights the key findings, looks at what motivates people to plug in USB sticks, and discusses...
blurry image for loading
blurry image for loading
security
Users really do plug in usb drives they find
Users really do plug in usb drives they find
Publication S&P 2016
In this research paper we investigate if people do plug random USB drives and found out that 45-98% do. We analyze the factors that affect opening rate and people motivation for plug-in in their computers those insecure drives.
--
Get cutting edge research directly in your inbox.