Font Size: a A A

USB Hardware Trojan Horse Device Attack

Posted on:2014-07-11Degree:M.SType:Thesis
University:University of California, IrvineCandidate:Lee, Calvin Chee KeongFull Text:PDF
GTID:2458390005488329Subject:Information Technology
Abstract/Summary:
Computer security has existed since the creation of the first computer. However, the advancement of computer technology has led to new forms of attacks. Firewall, security software and other various methods have been enforced to protect the valuable data in computers. Computer users are often aware of the danger of attacks that come from outside the firewall. However, many are not aware that attacks can be performed using a commonly used interface: the Universal Serial Bus (USB). Therefore, there is an imminent need for the general public to be aware of the dangers of USB attacks. The purpose of this thesis is to unravel the underlying protocol of USB, investigate the vulnerability of known USB based attacks and demonstrate vulnerability by using a simulated attack.
Keywords/Search Tags:USB, Attacks
Related items