Towards Protection Against a USB Device Whose Firmware Has Been Compromised or Turned as ‘BadUSB’
Conference paper
First Online:
Abstract
A BadUSB is a Universal Serial Bus (USB) device (usually a mass storage device) whose firmware has been modified so as to spoof itself as another device (such as a keyboard) in order to avoid being scanned by an anti-virus. This way, a pre-written script runs, after the infected USB device is plugged-in, and keystrokes from a keyboard are simulated. This can cause an attacker to install backdoors, keyloggers, password sniffers etc. This paper attempts to solving this problem by presenting hardware—software coupled design which allows the user to have an additional layer of security so that such devices can be identified and stopped.
Keywords
USB Firmware attack Device spoofing Hacking Device compromisedReferences
- 1.Nohl, K., Lell, J., Kri, S.: Turning USB peripherals into BadUSB (2014) [Online]. Available: https://srlabs.de/badusb/
- 2.Nohl, K., Kri, S., Lell, J.: BadUSB—on accessories that turn evil (2014)Google Scholar
- 3.USB Mass Storage Device (2011) [Online] http://docshare01.docshare.tips/files/5761/57611265.pdf
- 4.Caudill, Adam, Wilson, Brandon: Making BadUSB work for you. Derbycon, Location (2014)Google Scholar
- 5.USB in a Nutshell. Making Sense of the USB StandardGoogle Scholar
- 6.Davies, Z.: “USB,” Ziff Davies Inc (2010)Google Scholar
- 7.Li, G., Li, M., Zhao, G., Zang, J.: Research on USB driver for data acquisition. In: 2010 2nd International Conference on Future Computer and Communication (ICFCC), pp. V2-74-V2-78 (2010)Google Scholar
- 8.Cui, A., Costello, M., Stolfo, S.J.: When firmware modifications attack: a case study of embedded exploitation. In: Presented at the 20th Annual Network and Distributed System Security Symposium (2013)Google Scholar
- 9.Basnight, Z., Butts, J., Lopez, J., Dube, T.: Firmware modification attacks on programmable logic controllers. Int. J. Crit. Infrastruct. Prot. 6, 76–84 (2013)CrossRefGoogle Scholar
- 10.Denning, D.E.: Stuxnet: what has changed? Future Internet 4, 672–687 (2012)CrossRefGoogle Scholar
- 11.Password Stealing USB [Online]. Available: http://www.gohacking.com/hack-passwords-using-usb-drive/
- 12.Beegle, L.E.: Rootkits and their effects on information security. Inf. Syst. Secur. 16, 164–176 (2007)CrossRefGoogle Scholar
- 13.M. B. Solutions “User’s Guide,” no. February 2004Google Scholar
- 14.Project BadUSB [Online]. Available: https://opensource.srlabs.de/projects/badusb
- 15.Universal serial bus device class specification for device firmware upgrade, pp. 1–44 (1999)Google Scholar
- 16.Alcor: Alcor MP AU698x 100517 firmware [Online]. Available: http://www.flashdrive-repair.com/2013/06/download-alcor-mp-au698x-100517-firmware.html
- 17.Flashboot.ru: RecoverTool [Online]. Available: http://flashboot.ru/iflash/page5/
- 18.F. D. Repair, “SK6211_PDT_20090828.” [Online]. Available: http://www.flashdrive-repair.com/2014/09/download-skymedi-sk6211-pdt-20090828.html
- 19.Flashboot.ru,“3S_MP_Utility_v2162.” [Online]. Available: http://flashboot.ru/files/file/270/
- 20.Flashboot.ru, “Innostor_IS903_MP_Package.” [Online]. Available: http://flashboot.ru/files/file/379/
- 21.Caudill A.: Psychson—BadUSB code [Online]. Available: https://github.com/adamcaudill/Psychson/
- 22.Logitech, “G5Update12.exe.” [Online]. Available: http://www.logitech.com/pub/techsupport/mouse/G5Update12.exe
- 23.Tian, D.J., Bates, A., Butler, K.: Defending against malicious USB firmware with GoodUSB. Acsac, pp. 261–270 (2015)Google Scholar
- 24.D. Control and A. Control, “BadUSB- sticks locked out DriveLock Device Control protects against BadUSB Ludwigsburg, August 2014. Companies that want to protect against infection of a so-called BadUSB sticks have an effective solution with the award winning DriveLock Device Control,” 2014Google Scholar
- 25.Endpoint Protector [Online]. Available: http://www.endpointprotector.com/solutions/badusb-threats-risks-and-how-to-protect-yourself
- 26.Imation, “Ironkey.” [Online]. Available: http://www.ironkey.com/en-US/solutions/protect-against-badusb.html
- 27.Ducklin, P.: Never trust a USB device again [Online]. Available: https://nakedsecurity.sophos.com/2014/08/02/badusb-what-if-you-could-never-trust-a-usb-device-again/
- 28.USB Debug Techniques [Online]. Available: http://processors.wiki.ti.com/index.php/USB_Debug_Techniques#USB_protocol_analyze
- 29.Totalphase, “Beagle USB 12 Protocol Analyser” [Online]. Available: http://www.totalphase.com/products/beagle-usb12/
- 30.Ellisys, “USB Explorer 200, USB Protocol Analyser” [Online]. Available: http://www.ellisys.com/products/usbex200/
- 31.Virtual USB Analyser [Online]. Available: http://vusb-analyzer.sourceforge.net/
- 32.Teledyne, Mercury T2 Protocol analyser [Online]. Available: http://teledynelecroy.com/protocolanalyzer/protocoloverview.aspx?seriesid=414
- 33.Frontline, ComProbe USB [Online]. Available: http://www.fte.com/products/FTS4USB-details.aspx
- 34.B. Logic, USB a NutShell.” [Online]. Available: http://www.beyondlogic.org/usbnutshell
- 35.Griscioli, F., Pizzonia, M., Sacchetti, M.: USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction. 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE (2016)Google Scholar
Copyright information
© Springer Nature Switzerland AG 2020