Compromise through USB-based Hardware Trojan Horse device

作者: John Clark , Sylvain Leblanc , Scott Knight

DOI: 10.1016/J.FUTURE.2010.04.008

关键词: Protocol (object-oriented programming)Hardware TrojanComputer scienceCompromiseEmbedded systemUSBComputer securityHardware trojan horseComputer Networks and CommunicationsHardware and ArchitectureSoftware

摘要: This paper continues the discussion of risks posed by Hardware Trojan Horse devices detailing research efforts to build such a based on unintended USB channels. Because ubiquitousness protocol in contemporary computer systems, focused identifying, characterizing and modeling The demonstrated that channels can allow creation two way communications with targeted network endpoint, thus violating integrity confidentiality data residing endpoint. work was validated through design implementation Proof Concept uses successfully interact target endpoint compromise exfiltrate from it.

参考文章(11)
Gaurav Shah, Andres Molina, Matt Blaze, Keyboards and covert channels usenix security symposium. pp. 5- ,(2006)
María S. Pérez, Bin Xiao, Special section: Security on grids and distributed systems Future Generation Computer Systems. ,vol. 23, pp. 774- 775 ,(2007) , 10.1016/J.FUTURE.2007.02.001
G. Laccetti, G. Schmid, A framework model for grid security Future Generation Computer Systems. ,vol. 23, pp. 702- 713 ,(2007) , 10.1016/J.FUTURE.2007.01.002
Seoksoo Kim, Soongohn Kim, Geuk Lee, Structure design and test of enterprise security management system with advanced internal security Future Generation Computer Systems. ,vol. 25, pp. 358- 363 ,(2009) , 10.1016/J.FUTURE.2006.04.019
M. Smith, M. Schmidt, N. Fallenbeck, T. Dörnemann, C. Schridde, B. Freisleben, Secure on-demand grid computing Future Generation Computer Systems. ,vol. 25, pp. 315- 325 ,(2009) , 10.1016/J.FUTURE.2008.03.002
Ronald William Smith, George Scott Knight, Predictable Design of Network-Based Covert Communication Systems ieee symposium on security and privacy. pp. 311- 321 ,(2008) , 10.1109/SP.2008.26
Yier Jin, Nathan Kupp, Yiorgos Makris, Experiences in Hardware Trojan design and implementation hardware oriented security and trust. pp. 50- 57 ,(2009) , 10.1109/HST.2009.5224971
John Clark, Sylvain Leblanc, Scott Knight, Hardware Trojan Horse Device Based on Unintended USB Channels network and system security. pp. 1- 8 ,(2009) , 10.1109/NSS.2009.48
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic, Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis defect and fault tolerance in vlsi and nanotechnology systems. pp. 87- 95 ,(2008) , 10.1109/DFT.2008.61
Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic, New design strategy for improving hardware Trojan detection and reducing Trojan activation time hardware oriented security and trust. pp. 66- 73 ,(2009) , 10.1109/HST.2009.5224968