To (US) Be or Not to (US) Be: Discovering Malicious USB Peripherals through Neural Network-Driven Power Analysis

KA Koffi, C Smiliotopoulos, C Kolias, G Kambourakis - Electronics, 2024 - mdpi.com
Nowadays, The Universal Serial Bus (USB) is one of the most adopted communication
standards. However, the ubiquity of this technology has attracted the interest of attackers …

A deep-learning-based approach to keystroke-injection payload generation

V Gurčinas, J Dautartas, J Janulevičius, N Goranin… - Electronics, 2023 - mdpi.com
Investigation and detection of cybercrimes has been in the spotlight of cybersecurity
research for as long as the topic has existed. Modern methods are required to keep up with …

A comprehensive taxonomy of attacks and mitigations in IoT Wi-Fi networks: physical and data-link layer

S Almjamai - 2022 - diva-portal.org
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi)
networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected …

DESIGN AND CONSTRUCTION OF A SMART BLUETOOTH BASED AUTOMATIC TRANSFER SWITCH CHANGEOVER FOR SMALL HOUSEHOLD GENERATORS

DM Oderinde, MO Afolayan, DS Yawas… - Jurnal …, 2023 - jurnalmekanikal.utm.my
DESIGN AND CONSTRUCTION OF A SMART BLUETOOTH BASED AUTOMATIC
TRANSFER SWITCH CHANGEOVER FOR SMALL HOUSEHOLD GENERATORS Page 1 …

BadUSB-C: Revisiting BadUSB with Type-C

F Zhang - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
The security of the USB protocol has been paid extensive attention to because of its wide
usage. Due to the trust-by-default characteristics, USB security has caused severe problems …

[PDF][PDF] SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware

S Liao, H Chen, Z Yang - yangzhice.com
In this paper, we propose an innovative method for fingerprinting USB peripherals. While
USB technology has made significant progress in data transfer efficiency, by default, the …

[PDF][PDF] IMPLEMENT RUBBER DUCKIES ON AVAILABLE USB DEVICES AND MAKE A PRACTICAL TEST

H DO - theses.cz
This thesis deals with computer security attack named BadUSB, implements an example
device (Rubber Ducky) and looks for a defense against these types of attack. My task is to …

[PDF][PDF] Bachelor's Thesis Assignment

S NEUNER, AG VOYIATZIS, S FOTOPOULOS… - theses.cz
This thesis deals with computer security attack named BadUSB, implements an example
device (Rubber Ducky) and looks for a defense against these types of attack. My task is to …