Hardware-based Cyber Threats

Thiago Alves, Thomas Morris

Abstract

During the last decade, cyber-security experts have been trying to mitigate attacks against computer networks and software. After the internet, the proliferation of thousands of virus, worms and trojans became easier, which then required enhancements for Operating Systems, browsers and anti-virus software in order to keep their users safe. However, what happens when the threat comes from the hardware? The Operating System trusts entirely in the hardware to perform its operations. If the hardware has been taken, it becomes much harder to regain control of the system. This paper describes eight different approaches to hardware attacks against software. It also demonstrates how to perform an attack using a USB device patched to behave like a generic HID Input Device, in order to insert malicious code in the system.

References

Download


Paper Citation


in Harvard Style

Alves T. and Morris T. (2018). Hardware-based Cyber Threats.In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-282-0, pages 259-266. DOI: 10.5220/0006577202590266


in Bibtex Style

@conference{icissp18,
author={Thiago Alves and Thomas Morris},
title={Hardware-based Cyber Threats},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2018},
pages={259-266},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006577202590266},
isbn={978-989-758-282-0},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Hardware-based Cyber Threats
SN - 978-989-758-282-0
AU - Alves T.
AU - Morris T.
PY - 2018
SP - 259
EP - 266
DO - 10.5220/0006577202590266