Font Size: a A A

Research On Attack And Defense Technology For Malicious USB Device

Posted on:2018-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:W Y TangFull Text:PDF
GTID:2428330596489220Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the development of APT attack and defensive techniques,attacks on mobile devices are becoming increasingly rampant,including lots of malicious USB devices attack case.Such novel attacks exploit the vulunerabilities of operating system to launch the attackes by combining the software and hardware.For the operating system for a long time on USB protocol support,leading to such equipment attack can not be blocked by the software technology.Its main attack object of target is BYOD equipment,as BYOD devices becoming a technical trend,such attacks should not be underestimated.Malicious USB devices can analog keyboard to enter a pre-compiled attack command or malicious code,after the computer identifies and enumerates the device,inputting attack code immediately and invading of equipment,thus achieving the effect of active attack.Based on those security topics,this thesis,firstly,studied on Windows operating system and analyzed various malicious USB device attack cases.Then produce such equipment to restore attack above.Besides,expansion the physical storage space,privileges promotion,enriching the forms of attack with such equipment.Second,based on such attack scenarios,author combined with APT attack method,expand the scopes of attack scene,such as in non-network environment and high protection environment,then discuss the ability of anti-forensics is discussed.Finally,analyzed the attack of such equipment,combined with the research status of the defense of such equipment,author proposed a novel defense system based on Intel-VT virtual technology.This system can prevent the attack of such equipment effectively without affections on the operation of this device.
Keywords/Search Tags:Malicious USB device, Analog input, Virtual defense, High protection environment
PDF Full Text Request
Related items