USB-based attacks

Research output: Contribution to journalReview articlepeer-review

64 Scopus citations

Abstract

Attackers increasingly take advantage of innocent users who tend to use USB peripherals casually, assuming these peripherals are benign when in fact they may carry an embedded malicious payload that can be used to launch attacks. In recent years, USB peripherals have become an attractive tool for launching cyber-attacks. In this survey, we review 29 different USB-based attacks and utilize our new taxonomy to classify them into four major categories. These attacks target both individuals and organizations; utilize widely used USB peripherals, such as keyboards, mice, flash drives, smartphones etc. For each attack, we address the objective it achieves and identify the associated and vulnerable USB peripherals and hardware.

Original languageEnglish
Pages (from-to)675-688
Number of pages14
JournalComputers and Security
Volume70
DOIs
StatePublished - 1 Sep 2017

Keywords

  • Attack
  • Device
  • Malicious
  • Malware
  • USB

ASJC Scopus subject areas

  • General Computer Science
  • Law

Fingerprint

Dive into the research topics of 'USB-based attacks'. Together they form a unique fingerprint.

Cite this