Spreading huge free software without internet connection, via self-replicating USB keys

نویسنده

  • Thierry Monteil
چکیده

We describe and discuss an affordable way to spread huge software without relying on internet connection, via the use of self-replicating live USB keys.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attestation & Authentication for USB Communications

In this paper, we present the design, implementation, and software testing of USBSec, a secure extension of the vanilla USB protocol that incorporates host authentication to defend against software threats. Specifically, we force the USB host to supply authentication information to the peripheral device before enumerating the device. The peripheral validates the authentication information again...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A vulnerability assessment of roaming soft certificate PKI solutions

In the past two or three years most major PKI technology vendors have released products which allow digital certificate holders with “soft certificates” to have their private keys stored at a central server and uploaded when needed to their local machine. This allows users to “roam” from one machine to another without having to manually manage the export and import of their keys onto temporary ...

متن کامل

A Secure Data Transfer Algorithm for USB Mass Storage Devices to Protect Documents

The Universal Serial Bus (USB) has become the most popular interface standard for hardware connection, and there has been a huge growth in the number of USB peripheral devices. External USB storage devices, in particular, are the most popular applications in market. Unfortunately, because USB affords high speed data transmission and is extremely convenient to use, many companies have prohibited...

متن کامل

Self-Controlled Jamming Resilient Design Using Physical Layer Secret Keys

Direct-sequence spread spectrum (DSSS) has been recognized as an effective jamming resilient technique. However, the effectiveness of DSSS relies on the use of either pre-shared unique secret keys or a bank of public codes, which can be prohibitively expensive in future large-scale decentralized wireless networks, e.g., the Internet of Things. To tackle this problem, in this work we develop a n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1311.6754  شماره 

صفحات  -

تاریخ انتشار 2013