Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment
Title | Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Efendy, Rezky Aulia, Almaarif, Ahmad, Budiono, Avon, Saputra, Muhardi, Puspitasari, Warih, Sutoyo, Edi |
Conference Name | 2019 International Conference on ICT for Smart Society (ICISS) |
Date Published | Nov. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4880-9 |
Keywords | Arduino Pro Microdevice, attack vector, attack vectors, composability, Computer crime, data exchange devices, data storage, device drivers, digital storage, electronic data interchange, flash memories, fork bomb, media exchanges, memory performance, Metrics, operating systems (computers), primary storage devices, pubcrawl, resilience, Resiliency, security of data, system buses, USB attack, USB based Fork Bomb attack, USB flash drive devices, Windows, Windows environment, Windows operating system, Windows Operating System Security |
Abstract | The need for data exchange and storage is currently increasing. The increased need for data exchange and storage also increases the need for data exchange devices and media. One of the most commonly used media exchanges and data storage is the USB Flash Drive. USB Flash Drive are widely used because they are easy to carry and have a fairly large storage. Unfortunately, this increased need is not directly proportional to an increase in awareness of device security, both for USB flash drive devices and computer devices that are used as primary storage devices. This research shows the threats that can arise from the use of USB Flash Drive devices. The threat that is used in this research is the fork bomb implemented on an Arduino Pro Micro device that is converted to a USB Flash drive. The purpose of the Fork Bomb is to damage the memory performance of the affected devices. As a result, memory performance to execute the process will slow down. The use of a USB Flash drive as an attack vector with the fork bomb method causes users to not be able to access the operating system that was attacked. The results obtained indicate that the USB Flash Drive can be used as a medium of Fork Bomb attack on the Windows operating system. |
URL | https://ieeexplore.ieee.org/document/8969789/ |
DOI | 10.1109/ICISS48059.2019.8969789 |
Citation Key | efendy_exploring_2019 |
- Metrics
- Windows Operating System Security
- Windows operating system
- Windows environment
- Windows
- USB flash drive devices
- USB based Fork Bomb attack
- USB attack
- system buses
- security of data
- Resiliency
- resilience
- pubcrawl
- primary storage devices
- operating systems (computers)
- Arduino Pro Microdevice
- memory performance
- media exchanges
- fork bomb
- flash memories
- electronic data interchange
- digital storage
- device drivers
- data storage
- data exchange devices
- Computer crime
- composability
- Attack vectors
- attack vector