Spreading huge free software without internet connection, via self-replicating USB keys
نویسنده
چکیده
We describe and discuss an affordable way to spread huge software without relying on internet connection, via the use of self-replicating live USB keys.
منابع مشابه
Attestation & Authentication for USB Communications
In this paper, we present the design, implementation, and software testing of USBSec, a secure extension of the vanilla USB protocol that incorporates host authentication to defend against software threats. Specifically, we force the USB host to supply authentication information to the peripheral device before enumerating the device. The peripheral validates the authentication information again...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملA vulnerability assessment of roaming soft certificate PKI solutions
In the past two or three years most major PKI technology vendors have released products which allow digital certificate holders with “soft certificates” to have their private keys stored at a central server and uploaded when needed to their local machine. This allows users to “roam” from one machine to another without having to manually manage the export and import of their keys onto temporary ...
متن کاملA Secure Data Transfer Algorithm for USB Mass Storage Devices to Protect Documents
The Universal Serial Bus (USB) has become the most popular interface standard for hardware connection, and there has been a huge growth in the number of USB peripheral devices. External USB storage devices, in particular, are the most popular applications in market. Unfortunately, because USB affords high speed data transmission and is extremely convenient to use, many companies have prohibited...
متن کاملSelf-Controlled Jamming Resilient Design Using Physical Layer Secret Keys
Direct-sequence spread spectrum (DSSS) has been recognized as an effective jamming resilient technique. However, the effectiveness of DSSS relies on the use of either pre-shared unique secret keys or a bank of public codes, which can be prohibitively expensive in future large-scale decentralized wireless networks, e.g., the Internet of Things. To tackle this problem, in this work we develop a n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1311.6754 شماره
صفحات -
تاریخ انتشار 2013