USB Keyboard Security Unit

نویسنده

  • Lucjan Hanzlik
چکیده

24 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract— Every user has its specific rhythm of typing which could be used as a biometrics in order to build some kind of "footprint" – unique profile. If somebody gets to know this profile, legitimate user is endangered by tracking and being impersonated. That is the way typing rhythm must be protected. We designed a hardware-based device in order to protect the identity of the individual during usage of keyboard (typing). The unit is plugged between the keyboard and the personal computer and works as an interface modifying data on the fly in the model "man in the middle". Thanks to these modifications, an adversary who eavesdrops communication between a legitimate user and workstation gets practically no information about the "keystroking identity" of user. The security unit is based on two microprocessors: AVR AT90USB1287 working as USB Host simulating workstation and AVR Atmega88 working as USB Device simulating virtual keyboard. In the paper we present technical details of the security unit including electronic schemes and PCB referring to previously designed protection algorithms and results of performed efficiency tests as well.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unit 2: Hardware Background

The hardware portion of a system comprises all physical components, including the central processing unit, memory, motherboard, hard drive, graphics chip, network interface cards, USB and other ports, mouse, keyboard, display and more. The many varied types of hardware components combine to perform just three essential functions: inputting and outputting data (i.e., I/O), processing data, and s...

متن کامل

Reversing and exploiting an Apple firmware update

The security posture of a computer can be adversely affected by poorly-designed devices on its USB bus. Many modern embedded devices permit firmware to be upgraded in the field and the use of low-cost microcontrollers in these devices can make it difficult to perform the mathematical operations needed to verify a cryptographic signature. The security of many of these upgrade mechanisms is very ...

متن کامل

Hardware Background

The hardware portion of a system comprises all physical components, including the central processing unit, memory, motherboard, hard drive, graphics chip, network interface cards, USB and other ports, mouse, keyboard, display and more. The many varied types of hardware components combine to perform just three essential functions: inputting and outputting data (i.e., I/O), processing data, and s...

متن کامل

USBWall: A novel security mechanism to protect against maliciously reprogrammed USB devices

Universal Serial Bus (USB) is a popular choice of interfacing computer systems with peripherals. With the increasing support of modern operating systems, it is now truly plug-and-play for most USB devices. However, this great convenience comes with a risk that can allow a device to perform arbitrary actions at any time while it is connected. Researchers have confirmed that a simple USB device s...

متن کامل

BadUSB 2.0: Exploring USB Man-In-The-Middle Attacks

The uses and capabilities of rogue USB hardware implants for use in cyber espionage activities is still very much an unknown quantity in the industry. Security professionals would benefit from tools capable of exploring the threat landscape while increasing awareness and countermeasures in this area. BadUSB 2.0 or BadUSB2 is such an investigative tool capable of compromising USB fixed-line comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014