add alternative section and complementary projects section
This commit is contained in:
parent
1726a3fd8f
commit
8dd98b0b9c
3 changed files with 81 additions and 3 deletions
|
|
@ -2074,3 +2074,37 @@ series = {UbiComp '10}
|
|||
|
||||
doi={10.1109/TVT.2023.3236820}}
|
||||
|
||||
|
||||
@article{cannoles2017hacking,
|
||||
title={Hacking experiment by using USB rubber ducky scripting},
|
||||
author={Cannoles, Benjamin and Ghafarian, Ahmad},
|
||||
journal={Journal of Systemics},
|
||||
volume={15},
|
||||
number={2},
|
||||
pages={6671},
|
||||
year={2017}
|
||||
}
|
||||
|
||||
@article{NISSIM2017675,
|
||||
title = {USB-based attacks},
|
||||
journal = {Computers \& Security},
|
||||
volume = {70},
|
||||
pages = {675-688},
|
||||
year = {2017},
|
||||
issn = {0167-4048},
|
||||
doi = {https://doi.org/10.1016/j.cose.2017.08.002},
|
||||
url = {https://www.sciencedirect.com/science/article/pii/S0167404817301578},
|
||||
author = {Nir Nissim and Ran Yahalom and Yuval Elovici},
|
||||
keywords = {USB, Device, Attack, Malicious, Malware},
|
||||
abstract = {Attackers increasingly take advantage of innocent users who tend to use USB peripherals casually, assuming these peripherals are benign when in fact they may carry an embedded malicious payload that can be used to launch attacks. In recent years, USB peripherals have become an attractive tool for launching cyber-attacks. In this survey, we review 29 different USB-based attacks and utilize our new taxonomy to classify them into four major categories. These attacks target both individuals and organizations; utilize widely used USB peripherals, such as keyboards, mice, flash drives, smartphones etc. For each attack, we address the objective it achieves and identify the associated and vulnerable USB peripherals and hardware.}
|
||||
}
|
||||
|
||||
@inproceedings{su2017usb,
|
||||
title={USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.},
|
||||
author={Su, Yang and Genkin, Daniel and Ranasinghe, Damith Chinthana and Yarom, Yuval},
|
||||
booktitle={USENIX Security Symposium},
|
||||
volume={8},
|
||||
pages={1145--1161},
|
||||
year={2017}
|
||||
}
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue