[1]Chen T M, AbuNimeh S. Lessons from Stuxnet[J]. Computer, 2011, 44(4): 9193[2]Orrey K. A survey of USB exploit mechanisms, profiling Stuxnet and the possible adaptive measures that could have made it more effective[R]. Bristol, UK: Vulnerability Assessment, 2011[3]Forum U I. USB Class Codes[EBOL]. (20151105) [20151220]. http:www.usb.orgdevelopersdefined_class#BaseClass0Fh[4]Forum U I. Universal Serial Bus HID Usage Tables[SOL]. 2004 [20151220]. http:www.usb.org[5]刘荣. 圈圈教你玩USB[M]. 2版. 北京: 北京航空航天大学出版社, 2013: 10155[6]Forum U I. Universal Serial Bus Device Class Definition for Human Interface Devices (HID)[SOL]. 2001 [20151220]. http:www.usb.org[7]Forum U I. Universal Serial Bus Specification Revision 2.0[SOL]. 2000 [20151220]. http:www.usb.org[8]Weis S. Protecting data inuse from firmware and physical attacks[R]. Las Vegas: BlackHat USA, 2014[9]Pisani J, Carugati P, Rushing R. USBHID hacker interface design[R]. Las Vegas: BlackHat USA, 2010[10]Rabbit_Run. BadUSB的前世今生: USB rubber ducky和teensy USB[EBOL]. (20141017) [20151220]. http:www.freebuf.comtools47411.html[11]Schumilo S, Spenneberg R, Schwartke H. Dont trust your USB! How to find bugs in USB device drivers[R]. Amsterdam: BlackHat Europe, 2014[12]Wang Zhaohui, Stavrou A. Exploiting smartphone USB connectivity for fun and profit[C] Proc of the 26th Annual Computer Security Applications Conf (ACSAC 2010). New York: ACM, 2010: 357366[13]Adrian C. Plug and prey: Malicious USB devices[JOL]. 2011 [20120302]. http:www.irongeek.comdownloadsMalicious%20USB%20Devices.pdf[14]Nohl K, Lell J. BadUSB—On accessories that turn evil[R]. Las Vegas: BlackHat USA, 2014[15]Maskiewicz J, Ellis B, Mouradian J, et al. Mouse trap: Exploiting firmware updates in USB peripherals[C] Proc of the 8th USENIX Workshop on Offensive Technologies (WOOT 14). Berkeley: UESNIX Association, 2014: 110[16]Brocker M, Checkoway S. iSeeYou: Disabling the MacBook webcam indicator LED[C] Proc of USENIX Conf on Security Symp. Berkeley: UESNIX Association, 2014: 337352[17]Tzokatziou G, Maglaras L, Janicke H, et al. Exploiting SCADA vulnerabilities using a human interface device[J]. International Journal of Advanced Computer Science & Applications, 2015, 6(7): 234241[18]吕志强, 刘喆, 常子敬, 等. 恶意USB设备攻击与防护技术研究[J]. 信息安全研究, 2016, 2(2): 150158[19]Wang Zhaohui, Johnson R, Stavrou A. Attestation & authentication for USB communications[C] Proc of the 6th IEEE Int Conf on Software Security and Reliability Companion (SEREC). Washington, DC: IEEE Computer Society, 2012: 4344[20]Barbhuiya F A, Saikia T, Nandi S. An anomaly based approach for HID attack detection using keystroke dynamics[M] Cyberspace Safety and Security. Berlin: Springer, 2012: 139152[21]Jeanne G, Desplanques F. Attacks using malicious devices: A way to protect yourself against physical access[C] Proc of the 2nd Int Symp on Research in GreyHat Hacking. Berlin: Springer, 2013: 130137[22]Kang M. USBWall: A novel security mechanism to protect against maliciously reprogrammed USB devices[D]. Lawrence: University of Kansas, 2015[23]Lee B, Lee J H. Blockchainbased secure firmware update for embedded devices in an Internet of things environment[J]. Journal of Supercomputing, 2016, 72(9): 116[24]Tian Jing, Bates A, Butler K. Defending against malicious USB firmware with GoodUSB[C] Proc of the Computer Security Applications Conf. New York: ACM, 2015: 261270[25]Sebastian P, Jan G. A honeypot for arbitrary malware on USB storage devices[C] Proc of the 7th Int Conf on Risk and Security of Internet and Systems. Washington, DC: IEEE Computer Society, 2012: 18[26]Provos N. A virtual honeypot framework[C] Proc of USENIX Security Symp. Berkeley: UESNIX Association, 2004: 114[27]Angel S, Wahby R S, Howald M, et al. Defending against malicious peripherals with Cinch[C] Proc of USENIX Security Symp. Berkeley: UESNIX Association, 2016: 396414[28]Guidorizzi R P. Security: Active authentication[J]. It Professional, 2013, 15(4): 47[29]Fridman A, Stolerman A, Acharya S, et al. Decision Fusion for multimodal active authentication[J]. It Professional, 2013, 15(4): 2933[30]Li Fudong, Clarke N, Papadaki M, et al. Active authentication for mobile devices utilising behaviour profiling[J]. International Journal of Information Security, 2014, 13(3): 229244
|