Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices
نویسندگان
چکیده
Malware replicating via USB storage devices including worms, virus, Trojan horses and other malicious codes together with USB based hack tools such as Pod Slurp and USB Switchblade have accounted for many serious security issues for the last few years. The majority of these malicious codes exploit Windows Autoplay features to automatically launch attacks on host computers transparently to the users. In this paper, we will analyze the vulnerabilities in the default settings of the latest Windows operating systems which allow malware from attached USB storage devices to launch attacks on the computers. We will also propose solutions and patches for the vulnerabilities in form of ready-to-deploy scripts which can be run by any computer users. The solutions will focus on the latest Windows operating systems including Windows XP SP2, Windows Vista, Windows 7, and Windows 2008.
منابع مشابه
Universal serial bus based software attacks and protection solutions
Information security risks associated with Universal Serial Bus (USB) storage devices have been serious issues since 2003, which marked the wide adoption of USB technologies in the computing industry, especially in corporate networks. Due to the insecure design and the open standards of USB technologies, attackers have successfully exploited various vulnerabilities in USB protocols, USB embedde...
متن کاملProtecting Portable Data with Host Validation
The use of portable storage devices such as key-chain USB devices is now ubiquitous. Many use these devices with impunity–repeatedly using the same storage device in open computer laboratories, Internet cafes, and on office and home computers. Such devices are now the target of malware that exploit the data present or use them as a means to propagate malicious software, e.g., Conficker and Agen...
متن کاملForensic Carving of Network Packets and Associated Data Structures
Using validated carving techniques, we show that popular operating systems (e.g. Windows, Linux, and OSX) frequently have residual IP packets, Ethernet frames, and associated data structures present in system memory from long-terminated network traffic. Such information is useful for many forensic purposes including establishment of prior connection activity and services used; identification of...
متن کاملPocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment
Storage of sensitive and/or business critical data on portable USB attachable mass storage devices is a common practice. The ability to transport large volumes of data from the standard place of work and then access and process the data on an available PC at a different location provides both convenience and flexibility. However, use of such USB attachable mass storage devices presents two majo...
متن کاملA Security Hygienic Smart Charger for Mobile Devices
Measuring and attesting to the operational integrity and security posture of a mobile device is challenging. Today, smart phones and tablet computers lack a number of traditional security features that have emerged for commodity laptops and desktops. In addition to restricted power, mobile devices generally don’t have a hardware root-of-trust and currently lack ubiquitous virtualization capabil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010