Skip to main content

Cognitive Countermeasures against BAD USB

  • Conference paper
  • First Online:
Advances on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2016)

Abstract

Recently, a novel attack technique called BAD USB emerged. This attack injects and executes malicious codes in the firmware that is stored in USB controllers. A serious problem regarding BAD USB, which also manipulates the firmware maliciously, is that the existing anti-virus programs cannot detect it, so the seriousness of this kind of attack is increasing. To solve this problem several countermeasures have been researched, but these are not effective enough. Therefore, in this paper, we propose a way to verify the integrity of the driver or the firmware that is installed by BAD USB proposed. Through the use of this method, solutions for the prevention of the malicious BAD USB behaviors can be formulated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Lee, K. Yim, and E. H. Spafford, Reverse-safe authentication protocol for secure USB memories, Journal of the Security and Communication Networks (SCN), vol. 5, iss. 8, pp. 834-845, Aug. 2012

    Google Scholar 

  2. K. Lee, H. Yeuk, Y. Choi, S. Pho, I. You, and K. Yim, Safe Authentication Protocol for Secure USB Memories, Journal of the Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), vol.1, num.1, pp. 46-55, Jun. 2010

    Google Scholar 

  3. J. Kim, Y. Lee, K. Lee, T. Jung, D. Volokhov, and K. Yim, Vulnerability to Flash Controller for Secure USB Drives, Journal of the Internet Services and Information Security (IMIS), vol.3, num.3/4, pp. 136-145, Nov. 2013

    Google Scholar 

  4. H. Jeong, Y. Choi, W. Jeon, F. Yang, Y. Lee, S. Kim, and D. Won. Vulnerability analysis of secure usb flash drives. Proceedings of the 2007 IEEE International Workshop on Memory Technology, Design and Testing, (MTDT’07), Taipei, Taiwan, pages 61–64. IEEE, December 2007

    Google Scholar 

  5. S. L. Jewan Bang, ByeongYeong Yoo. Secure usb bypassing tool. Journal of the Digital Investigation, 7(Supplement):S114–S120, August 2010

    Google Scholar 

  6. K. Lee and K. Yim, Keyboard Security: A Technological Review, Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 9-15, Jun. 2011

    Google Scholar 

  7. K. Lee, K. Bae, and K. Yim, Hardware Approach to Solving Password Exposure Problem through Keyboard Sniff, Academic Science Research, WASET, pp. 23-25, Oct. 2009

    Google Scholar 

  8. K. Lee, W. Kim, K. Bae, and K. Yim, A Solution to Protecting USB Keyboard Data, Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 108-111, Nov. 2010

    Google Scholar 

  9. K. Nohl and J. Lell, BadUSB – on accessories that turn evil, Black Hat USA, Aug. 2014

    Google Scholar 

  10. S. Neuner, Marshall Plan Scholarship Final Report: Security of the Universal Serial Bus, Dec. 2014

    Google Scholar 

  11. D. J. Tian, A. Bates, K. Butler, Defending Against Malicious USB Firmware with GoodUSB, Proceedings of the Annual Computer Security Applications Conference (ACSAC), pp. 261-270, 2015

    Google Scholar 

  12. R. Langner, Stuxnet: Disserting a Cyberwarfare weapon, Journal of the IEEE Security & Privacy, vol. 9, iss. 3, pp. 49-51, Jun 2011

    Google Scholar 

  13. Microsoft Developer Network, Device and Driver Installation Example, https://msdn.microsoft.com/en-us/library/ff541158.aspx

  14. Microsoft Hardware Dev Center, IoInvalidateDeviceRelations routine, https://msdn.microsoft.com/en-us/library/windows/hardware/ff549353(v=vs.85).aspx

  15. Microsoft Hardware Dev Center, DEVICE_OBJECT structure, https://msdn.microsoft.com/en-us/library/windows/hardware/ff543147(v=vs.85).aspx

  16. Microsoft Hardware Dev Center, DRIVER_OBJECT, https://msdn.microsoft.com/en-us/library/windows/hardware/ff544174(v=vs.85).aspx

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lee, Y., Lee, H., Lee, K., Yim, K. (2017). Cognitive Countermeasures against BAD USB. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49106-6_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49105-9

  • Online ISBN: 978-3-319-49106-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics