USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs
نویسندگان
چکیده
The Universal Serial Bus (USB) is the most prominent interface for connecting peripheral devices to computers. USB-connected input devices, such as keyboards, cardswipers and fingerprint readers, often send sensitive information to the computer. As such information is only sent along the communication path from the device to the computer, it was hitherto thought to be protected from potentially compromised devices outside this path. We have tested over 50 different computers and external hubs and found that over 90% of them suffer from a crosstalk leakage effect that allows malicious peripheral devices located off the communication path to capture and observe sensitive USB traffic. We also show that in many cases this crosstalk leakage can be observed on the USB power lines, thus defeating a common USB isolation countermeasure of using a charge-only USB cable which physically disconnects the USB data lines. Demonstrating the attack’s low costs and ease of concealment, we modify a novelty USB lamp to implement an off-path attack which captures and exfiltrates USB traffic when connected to a vulnerable internal or a external USB hub.
منابع مشابه
USB3 Transmitter and Receiver Solutions
The Tektronix USBSSP-TX and USB-TX Automated Transmitter solutions provide an easy way to validate and characterize emerging USB 3.1 host controllers, hubs and devices. The TekExpress USB-RMT software enables flexible and intuitive receiver margin testing of USB 3.0 designs with the AWG7000 series Arbitrary Waveform Generators. The BERTScope BSAUSB31 Automated USB 3.1 Receiver Solution is desig...
متن کاملUSB3.1 Type-C Transmitter and Receiver Solutions
The Tektronix USBSSP-TX and USB-TX Automated Transmitter solutions provide an easy way to validate and characterize emerging USB 3.1 TypeC host controllers, hubs and devices with Tektronix MSO/DPO/70000DX/ SX series oscilloscopes. The TekExpress USB-RMT software enables flexible and intuitive receiver margin testing of USB 3.0 designs with the AWG7000 series Arbitrary Waveform Generators. The B...
متن کاملDetecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform
Time is recognised to be a dimension of paramount importance in computer forensics. In this paper, we report on the potential of identifying past pod slurping type of attacks by constructing a synthetic metric based on information contained in filesystem timestamps. More specifically, by inferring the transfer rate of a file from last access timestamps and correlating that to the characteristic...
متن کاملDefending against insider threats and internal data leakage
In the last decade, computer science researchers have been working hard to prevent attacks against the security of information systems. Different adversary models have incarnated the malicious entities against which researchers have defined security properties, identified security vulnerabilities, and engineered security defenses. These adversaries were usually intruders, that is, outsiders try...
متن کاملUniversal serial bus based software attacks and protection solutions
Information security risks associated with Universal Serial Bus (USB) storage devices have been serious issues since 2003, which marked the wide adoption of USB technologies in the computing industry, especially in corporate networks. Due to the insecure design and the open standards of USB technologies, attackers have successfully exploited various vulnerabilities in USB protocols, USB embedde...
متن کامل