Abstract
Recently, a novel attack technique called BAD USB emerged. This attack injects and executes malicious codes in the firmware that is stored in USB controllers. A serious problem regarding BAD USB, which also manipulates the firmware maliciously, is that the existing anti-virus programs cannot detect it, so the seriousness of this kind of attack is increasing. To solve this problem several countermeasures have been researched, but these are not effective enough. Therefore, in this paper, we propose a way to verify the integrity of the driver or the firmware that is installed by BAD USB proposed. Through the use of this method, solutions for the prevention of the malicious BAD USB behaviors can be formulated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
K. Lee, K. Yim, and E. H. Spafford, Reverse-safe authentication protocol for secure USB memories, Journal of the Security and Communication Networks (SCN), vol. 5, iss. 8, pp. 834-845, Aug. 2012
K. Lee, H. Yeuk, Y. Choi, S. Pho, I. You, and K. Yim, Safe Authentication Protocol for Secure USB Memories, Journal of the Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), vol.1, num.1, pp. 46-55, Jun. 2010
J. Kim, Y. Lee, K. Lee, T. Jung, D. Volokhov, and K. Yim, Vulnerability to Flash Controller for Secure USB Drives, Journal of the Internet Services and Information Security (IMIS), vol.3, num.3/4, pp. 136-145, Nov. 2013
H. Jeong, Y. Choi, W. Jeon, F. Yang, Y. Lee, S. Kim, and D. Won. Vulnerability analysis of secure usb flash drives. Proceedings of the 2007 IEEE International Workshop on Memory Technology, Design and Testing, (MTDT’07), Taipei, Taiwan, pages 61–64. IEEE, December 2007
S. L. Jewan Bang, ByeongYeong Yoo. Secure usb bypassing tool. Journal of the Digital Investigation, 7(Supplement):S114–S120, August 2010
K. Lee and K. Yim, Keyboard Security: A Technological Review, Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 9-15, Jun. 2011
K. Lee, K. Bae, and K. Yim, Hardware Approach to Solving Password Exposure Problem through Keyboard Sniff, Academic Science Research, WASET, pp. 23-25, Oct. 2009
K. Lee, W. Kim, K. Bae, and K. Yim, A Solution to Protecting USB Keyboard Data, Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 108-111, Nov. 2010
K. Nohl and J. Lell, BadUSB – on accessories that turn evil, Black Hat USA, Aug. 2014
S. Neuner, Marshall Plan Scholarship Final Report: Security of the Universal Serial Bus, Dec. 2014
D. J. Tian, A. Bates, K. Butler, Defending Against Malicious USB Firmware with GoodUSB, Proceedings of the Annual Computer Security Applications Conference (ACSAC), pp. 261-270, 2015
R. Langner, Stuxnet: Disserting a Cyberwarfare weapon, Journal of the IEEE Security & Privacy, vol. 9, iss. 3, pp. 49-51, Jun 2011
Microsoft Developer Network, Device and Driver Installation Example, https://msdn.microsoft.com/en-us/library/ff541158.aspx
Microsoft Hardware Dev Center, IoInvalidateDeviceRelations routine, https://msdn.microsoft.com/en-us/library/windows/hardware/ff549353(v=vs.85).aspx
Microsoft Hardware Dev Center, DEVICE_OBJECT structure, https://msdn.microsoft.com/en-us/library/windows/hardware/ff543147(v=vs.85).aspx
Microsoft Hardware Dev Center, DRIVER_OBJECT, https://msdn.microsoft.com/en-us/library/windows/hardware/ff544174(v=vs.85).aspx
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Lee, Y., Lee, H., Lee, K., Yim, K. (2017). Cognitive Countermeasures against BAD USB. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)