To (US) Be or Not to (US) Be: Discovering Malicious USB Peripherals through Neural Network-Driven Power Analysis
Nowadays, The Universal Serial Bus (USB) is one of the most adopted communication
standards. However, the ubiquity of this technology has attracted the interest of attackers …
standards. However, the ubiquity of this technology has attracted the interest of attackers …
A deep-learning-based approach to keystroke-injection payload generation
V Gurčinas, J Dautartas, J Janulevičius, N Goranin… - Electronics, 2023 - mdpi.com
Investigation and detection of cybercrimes has been in the spotlight of cybersecurity
research for as long as the topic has existed. Modern methods are required to keep up with …
research for as long as the topic has existed. Modern methods are required to keep up with …
A comprehensive taxonomy of attacks and mitigations in IoT Wi-Fi networks: physical and data-link layer
S Almjamai - 2022 - diva-portal.org
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi)
networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected …
networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected …
DESIGN AND CONSTRUCTION OF A SMART BLUETOOTH BASED AUTOMATIC TRANSFER SWITCH CHANGEOVER FOR SMALL HOUSEHOLD GENERATORS
DM Oderinde, MO Afolayan, DS Yawas… - Jurnal …, 2023 - jurnalmekanikal.utm.my
DESIGN AND CONSTRUCTION OF A SMART BLUETOOTH BASED AUTOMATIC
TRANSFER SWITCH CHANGEOVER FOR SMALL HOUSEHOLD GENERATORS Page 1 …
TRANSFER SWITCH CHANGEOVER FOR SMALL HOUSEHOLD GENERATORS Page 1 …
BadUSB-C: Revisiting BadUSB with Type-C
F Zhang - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
The security of the USB protocol has been paid extensive attention to because of its wide
usage. Due to the trust-by-default characteristics, USB security has caused severe problems …
usage. Due to the trust-by-default characteristics, USB security has caused severe problems …
[PDF][PDF] SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware
S Liao, H Chen, Z Yang - yangzhice.com
In this paper, we propose an innovative method for fingerprinting USB peripherals. While
USB technology has made significant progress in data transfer efficiency, by default, the …
USB technology has made significant progress in data transfer efficiency, by default, the …
[PDF][PDF] IMPLEMENT RUBBER DUCKIES ON AVAILABLE USB DEVICES AND MAKE A PRACTICAL TEST
H DO - theses.cz
This thesis deals with computer security attack named BadUSB, implements an example
device (Rubber Ducky) and looks for a defense against these types of attack. My task is to …
device (Rubber Ducky) and looks for a defense against these types of attack. My task is to …
[PDF][PDF] Bachelor's Thesis Assignment
S NEUNER, AG VOYIATZIS, S FOTOPOULOS… - theses.cz
This thesis deals with computer security attack named BadUSB, implements an example
device (Rubber Ducky) and looks for a defense against these types of attack. My task is to …
device (Rubber Ducky) and looks for a defense against these types of attack. My task is to …