Countermeasures for BadUSB Vulnerability

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerability Analysis and Countermeasures for WiFi-based Location Services and Applications

Wireless LANs, or WiFi, are very common in any household or business today. Their wireless nature allows mobility and convenience for the user and that opens up a lot of new possibilities in mobile devices such as smartphones and tablets. One application that makes use of wireless LANs is positioning, which can be used in areas where Global Positioning Systems may have trouble functioning or no...

متن کامل

Preventive Countermeasures For

A general transient stability control technique is applied to the design of preventive countermeasures consisting of rescheduling generators’ active power. The technique relies on SIME, a hybrid direct – time-domain method; and, like SIME, it preserves the accuracy of time-domain methods and their ability to handle any power system modeling, stability scenario and mode of instability. Its appli...

متن کامل

BadUSB 2.0: Exploring USB Man-In-The-Middle Attacks

The uses and capabilities of rogue USB hardware implants for use in cyber espionage activities is still very much an unknown quantity in the industry. Security professionals would benefit from tools capable of exploring the threat landscape while increasing awareness and countermeasures in this area. BadUSB 2.0 or BadUSB2 is such an investigative tool capable of compromising USB fixed-line comm...

متن کامل

Path Planning for Mine Countermeasures

We have developed path-planning techniques and tools to look for paths through minefields. Our techniques seek to balance the length and risk associated with different routes through a minefield. Our methods are intended to provide battlegroup commanders powerful new tools to evaluate alternative routes while searching for low risk paths. It is well known how to find the path of shortest distan...

متن کامل

Countermeasures for mobile agent security

Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. However, not all applications require the same set of countermeasures, nor can they depend entirely on the agent system to provide them. Instead, counter...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology

سال: 2015

ISSN: 1598-3986

DOI: 10.13089/jkiisc.2015.25.3.559