Secure USB bypassing tool

نویسندگان

  • Jewan Bang
  • Byeongyeong Yoo
  • Sangjin Lee
چکیده

As storage capacity increases due to development of flash memory techniques, use of USB memory has increased. As use of USB memory increases, violations of privacy and company confidentiality and technical information leakage occur more often. In this context, use of USB memories that provide security functions to protect the data in them is increasing. Most USB memories are equipped with basic security functions offered by the USB flash drive controller (hereafter called the “USB controller”). However, USB-controllerbased security functions have several vulnerabilities. This paper explains how security functions can be bypassed using USB controller commands and presents the design and implementation of a secure USB bypassing tool that bypass the USB security functions. a 2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerability to Flash Controller for Secure USB Drives

This paper analyzes a vulnerability in the flash controller for secure USB drives, which is meant to enable secure USB drives to prevent unauthorized access to the data stored on them. This controller divides a driver into several partitions, one of which is configured as a secure area to store secret information. Generally, secure USB drives supporting multiple partitions may have three differ...

متن کامل

Bypassing Passkey Authentication in Bluetooth Low Energy

Since the attack runs on the Security Manager layer, it can reuse a lot of the existing network stack that is already in place for this approach. This namely concerns everything bellow HCI [1]. Actually, the whole procedure starting with the authentication bypass and continuing to data injection (which would be a regular communication anyway) can be done using a general Bluetooth 4.0 Smart Read...

متن کامل

A Secure Data Transfer Algorithm for USB Mass Storage Devices to Protect Documents

The Universal Serial Bus (USB) has become the most popular interface standard for hardware connection, and there has been a huge growth in the number of USB peripheral devices. External USB storage devices, in particular, are the most popular applications in market. Unfortunately, because USB affords high speed data transmission and is extremely convenient to use, many companies have prohibited...

متن کامل

On the Design and Implementation of a Secure Time-Stamping Service

As the Internet grows in scale almost every year, security measures are expected to become all the more important on the Internet. A Time-stamping authority (TSA) is a trusted authority which provides a proof that a datum existed before a particular time. In this research, we implemented a RFC-3161 compliant time-stamping service over the Internet. The TSA server software was implemented on Lin...

متن کامل

Safe Authentication Protocol for Secure USB Memories

Due to its portability and accesibility, the USB memory has become one of the most popular storage devices. However, if the device is lost, stolen or hacked, it can lead to critical information leakage. It is natural that malicious insiders would try to thieve their colleagues’ USB memories. Consequently, various security-incorporated USB products have been developed. To our best knowledge, the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010