Skip to main content

Vulnerability Analysis on a Secure USB: Based on a Commercial Product A

  • Conference paper
  • First Online:
  • 1145 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 25))

Abstract

A secure USB memory appears to store data safely, protect the data stored inside by the security features such as user authentication, data protection, and access control. However, there is a problem that the security of the data stored inside of a USB device can not actually be preserved on all levels due to several discovered vulnerabilities such as bypassing user authentication and exposing decryption keys. In this paper, we analyze categorized potential vulnerabilities that are possible to be connected to real attacks, based on a commercial product A. With the analysis result, we expect that the security mechanism to counteract the proven vulnerabilities can be developed and applied more safely to the commercial devices to protect the sensitive data stored on a secure USB device, a USB disk, or a hard disk.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kyungroul, L., Kangbin, Y., Eugine, H.S.: Reverse-safe authentication protocol for secure USB memories. J. Secur. Commun. Netw. 5, 834–845 (2012)

    Article  Google Scholar 

  2. Jaein, K., Youngjun, L., Kyungroul, L., Taeyoung, J., Dmitry, V., Kangbin, Y.: Vulnerability to flash controller for secure USB drives. J. Internet Serv. Inf. Secur. 3, 136–145 (2013)

    Google Scholar 

  3. Kyungroul, L., Hyeungjun, Y., Youngtae, C., Sitha, P., Ilsun, Y., Kangbin, Y.: Safe authentication protocol for secure USB memories. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 1, 46–55 (2010)

    Google Scholar 

  4. MyoungSu, K., Kyungroul, L., Kangbin, Y.: Vulnerability analysis of secure disk: based on backup feature of product A. In: International Conference on Broadband and Wireless Computing, Communication and Applications, Barcelona, pp. 386–391 (2017)

    Google Scholar 

  5. Jewan, B., Byeongyeong, Y., Sangjin, L.: Secure USB bypassing tool. J. Digit. Invest. 7, S114–S120 (2010)

    Article  Google Scholar 

  6. Joe, G.: Attacks on and countermeasures for USB hardware token devices. In: Proceedings of the 5th Nordic Workshop on Secure IT Systems, Reykjavik, pp. 35–57 (2000)

    Google Scholar 

  7. Hanjae, J., Younsung, C., Woongryel, J., Fei, Y., Yunho, L., Seungjoo, K., and Dongho, W.: Vulnerability analysis of secure USB flash drives. In: Proceedings of the 2007 IEEE International Workshop on Memory Technology, Design and Testing, Taipei, pp. 61–64 (2007)

    Google Scholar 

  8. Keun-Gi, L., Hye-Won, L., Chang-Wook, P., Je-Wan, B., Kwon-youp, K., Sangjin, L.: USB PassOn: secure USB thumb drive forensic toolkit. In: Proceedings of the 2nd International Conference on Future Generation Communication and Networking, Hainan Island, pp. 279–282 (2008)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2018R1A4A1025632) and by the Basic Science Research Program through the National Research Foundation of Korea (NRF) that is funded by the Ministry of Education (NRF-2018R1D1A1B07047656).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, K., Oh, I., Jang, W., Choi, C., Yim, K. (2019). Vulnerability Analysis on a Secure USB: Based on a Commercial Product A. In: Barolli, L., Leu, FY., Enokido, T., Chen, HC. (eds) Advances on Broadband and Wireless Computing, Communication and Applications. BWCCA 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-030-02613-4_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02613-4_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02612-7

  • Online ISBN: 978-3-030-02613-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics