Visible to the public A Transparent Defense Against USB Eavesdropping Attacks

TitleA Transparent Defense Against USB Eavesdropping Attacks
Publication TypeConference Paper
Year of Publication2016
AuthorsNeugschwandtner, Matthias, Beitler, Anton, Kurmus, Anil
Conference NameProceedings of the 9th European Workshop on System Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4295-7
Keywordsattack vectors, Human Behavior, pubcrawl, resilience, Scalability
AbstractAttacks that leverage USB as an attack vector are gaining popularity. While attention has so far focused on attacks that either exploit the host's USB stack or its unrestricted device privileges, it is not necessary to compromise the host to mount an attack over USB. This paper describes and implements a USB sniffing attack. In this attack a USB device passively eavesdrops on all communications from the host to other devices, without being situated on the physical path between the host and the victim device. To prevent this attack, we present UScramBle, a lightweight encryption solution which can be transparently used, with no setup or intervention from the user. Our prototype implementation of UScramBle for the Linux kernel imposes less than 15% performance overhead in the worst case.
URLhttp://doi.acm.org/10.1145/2905760.2905765
DOI10.1145/2905760.2905765
Citation Keyneugschwandtner_transparent_2016