Visible to the public Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment

TitleExploring the Possibility of USB based Fork Bomb Attack on Windows Environment
Publication TypeConference Paper
Year of Publication2019
AuthorsEfendy, Rezky Aulia, Almaarif, Ahmad, Budiono, Avon, Saputra, Muhardi, Puspitasari, Warih, Sutoyo, Edi
Conference Name2019 International Conference on ICT for Smart Society (ICISS)
Date PublishedNov. 2019
PublisherIEEE
ISBN Number978-1-7281-4880-9
KeywordsArduino Pro Microdevice, attack vector, attack vectors, composability, Computer crime, data exchange devices, data storage, device drivers, digital storage, electronic data interchange, flash memories, fork bomb, media exchanges, memory performance, Metrics, operating systems (computers), primary storage devices, pubcrawl, resilience, Resiliency, security of data, system buses, USB attack, USB based Fork Bomb attack, USB flash drive devices, Windows, Windows environment, Windows operating system, Windows Operating System Security
Abstract

The need for data exchange and storage is currently increasing. The increased need for data exchange and storage also increases the need for data exchange devices and media. One of the most commonly used media exchanges and data storage is the USB Flash Drive. USB Flash Drive are widely used because they are easy to carry and have a fairly large storage. Unfortunately, this increased need is not directly proportional to an increase in awareness of device security, both for USB flash drive devices and computer devices that are used as primary storage devices. This research shows the threats that can arise from the use of USB Flash Drive devices. The threat that is used in this research is the fork bomb implemented on an Arduino Pro Micro device that is converted to a USB Flash drive. The purpose of the Fork Bomb is to damage the memory performance of the affected devices. As a result, memory performance to execute the process will slow down. The use of a USB Flash drive as an attack vector with the fork bomb method causes users to not be able to access the operating system that was attacked. The results obtained indicate that the USB Flash Drive can be used as a medium of Fork Bomb attack on the Windows operating system.

URLhttps://ieeexplore.ieee.org/document/8969789/
DOI10.1109/ICISS48059.2019.8969789
Citation Keyefendy_exploring_2019