Interdiction in practice—Hardware Trojan against a high-security USB flash drive
نویسندگان
چکیده
منابع مشابه
Wireless USB flash drive
The aim of this paper is to design a Wireless USB flash drive in which the USB flash drive can be used without connecting using the dongle. This makes the data transfer using USB more sophisticated. It also provides speed upto 1 Mbps
متن کاملDevelopment of a Personal Health Record System Based on USB Flash Drive and Web Service
Objective: The development of information communication technology (ICT) and the demand for managing the healthy lives of individuals are accelerating the informatization of the health and medical field. Considering this environment and the needs of the individual, this paper has designed and developed a web and mobile storage device-based personal health record (PHR) system that individuals ca...
متن کاملSecure Data Deletion for USB Flash Memory
People commonly use USB flash memory because of its convenience and portability. It stores various data such as documents, pictures, certificates, and private data (e.g., passwords, account numbers). These data, especially private data, should not be revealed to the outside. However, even when the stored data is deleted, these data can be recovered using data recovery programs. To prevent this ...
متن کاملUSB Keyboard Security Unit
24 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract— Every user has its specific rhythm of typing which could be used as a biometrics in order to build some kind of "footprint" – unique profile. If somebody gets to know this profile, legitimate user is endangered by tracking and being impersonated. That is the way typing rhythm must be protected. We des...
متن کاملAnalysis of USB Flash Drives in a Virtual Environment
This paper is a continuation of our previous work [1] in which we proposed an approach where two environments, conventional and virtual, are used independently in the forensic analysis of computer systems. We discuss the use of virtual environments in the analysis of USB flash drives in computer forensics investigations. After briefly introducing general concepts of a virtual environment and so...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptographic Engineering
سال: 2016
ISSN: 2190-8508,2190-8516
DOI: 10.1007/s13389-016-0132-7