loading
Documents

Research.Publish.Connect.

Paper

Authors: Thiago Alves and Thomas Morris

Affiliation: The University of Alabama in Huntsville, United States

ISBN: 978-989-758-282-0

Keyword(s): Cyber-security, Embedded Systems, Computer Hardware Security.

Abstract: During the last decade, cyber-security experts have been trying to mitigate attacks against computer networks and software. After the internet, the proliferation of thousands of virus, worms and trojans became easier, which then required enhancements for Operating Systems, browsers and anti-virus software in order to keep their users safe. However, what happens when the threat comes from the hardware? The Operating System trusts entirely in the hardware to perform its operations. If the hardware has been taken, it becomes much harder to regain control of the system. This paper describes eight different approaches to hardware attacks against software. It also demonstrates how to perform an attack using a USB device patched to behave like a generic HID Input Device, in order to insert malicious code in the system.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.235.48.106

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Alves T. and Morris T. (2018). Hardware-based Cyber Threats.In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-282-0, pages 259-266. DOI: 10.5220/0006577202590266

@conference{icissp18,
author={Thiago Alves and Thomas Morris},
title={Hardware-based Cyber Threats},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2018},
pages={259-266},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006577202590266},
isbn={978-989-758-282-0},
}

TY - CONF

JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Hardware-based Cyber Threats
SN - 978-989-758-282-0
AU - Alves T.
AU - Morris T.
PY - 2018
SP - 259
EP - 266
DO - 10.5220/0006577202590266

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.