作者: John Clark , Sylvain Leblanc , Scott Knight
DOI: 10.1016/J.FUTURE.2010.04.008
关键词: Protocol (object-oriented programming) 、 Hardware Trojan 、 Computer science 、 Compromise 、 Embedded system 、 USB 、 Computer security 、 Hardware trojan horse 、 Computer Networks and Communications 、 Hardware and Architecture 、 Software
摘要: This paper continues the discussion of risks posed by Hardware Trojan Horse devices detailing research efforts to build such a based on unintended USB channels. Because ubiquitousness protocol in contemporary computer systems, focused identifying, characterizing and modeling The demonstrated that channels can allow creation two way communications with targeted network endpoint, thus violating integrity confidentiality data residing endpoint. work was validated through design implementation Proof Concept uses successfully interact target endpoint compromise exfiltrate from it.