1,048 Hits in 8.1 sec

A Secure and Reliable Method to Protect USB Data

Alycia Sebastian
2019 APTIKOM Journal on Computer Science and Information Technologies  
Nowadays USB manufacturers offer password protection and fingerprint authentication to secure the USB data.  ...  In this paper, USB is devised as a highly secured portable boot medium with fingerprint authentication to secure the data.  ...  Integrating the concept of dynamic boot loader which automatically identifies the Live USB, with fingerprint secured USB will provide a user friendly environment to the user thereby both securing the data  ... 
doi:10.11591/aptikom.j.csit.34 fatcat:2mtkwc6tznb5vez4gkqr4fkrq4

A Secure Boot Loader System for Loading an Operating System with Fingerprint Authentication

In this paper, the USB is devised as a highly secured portable boot medium with fingerprint authentication to ensure data security.  ...  The usage of USB has grown exponentially in recent years and securing it has become a major concern.  ...  Hence, USB manufacturers provide security to the USB drive through software and hardware based protection schemes.  ... 
doi:10.35940/ijitee.e7649.0881019 fatcat:juwgilkdbnbgfp64eiavli3fbi

MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions [article]

Omar Adel Ibrahim, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro
2020 arXiv   pre-print
To thwart the above-cited raising threats, we propose MAGNETO, an efficient, non-interactive, and privacy-preserving framework to verify the authenticity of a USB flash drive, rooted in the analysis of  ...  We show that the magnetic emissions radiated during boot operations on a specific host are unique for each device, and sufficient to uniquely fingerprint both the brand and the model of the USB flash drive  ...  This publication was made possible by awards NPRP11S-0109-180242 and GSRA6-1-0528-19046, from the QNRF-Qatar National Research Fund, a member of Qatar Foundation.  ... 
arXiv:2002.05905v3 fatcat:7fesxg72onacrfl4mthnhhuqsy

Design of a Dynamic Boot Loader for Loading an Operating System

Alycia Sebastian, Dr. K. Siva Sankar
2019 Journal of Computer Science  
The purpose of this paper is to design a dynamic boot loader which removes the BIOS dependency and allow user to boot from USB without changing CMOS settings.  ...  In today's world people are constantly on move and portable system are in demand specially the USB devices due to its portability and accessibility compared to CD/DVD drives.  ...  The USB is divided into 2 partitions with the first partition made read only and second partition the secure one protected with fingerprint.  ... 
doi:10.3844/jcssp.2019.190.196 fatcat:urgzsyuj7nfdpfxajtrju7z72i

Abcd Analysis Of Fingerprint Hash Code, Password And Otp Based Multifactor Authentication Model

P. S. Aithal, Krishna Prasad
2018 Zenodo  
Fingerprints are not fully secret compare to passwords, because if passwords are leaked which can be easily revocable using another password and which is not true in case of fingerprint biometric security  ...  The analysis has brought out many critical constituent elements, which is one of the proofs for the success of the new methodology  ...  Disadvantages Security Issues User level security (For Biometric Image-Hash code) Easy to secure using personal devices like mobile phone, Laptop, USB drive, and private cloud drive  ... 
doi:10.5281/zenodo.1202336 fatcat:tukm7jhuf5hfbnk4zwgmmk3k5i

Universal serial bus based software attacks and protection solutions

Dung Vu Pham, Ali Syed, Malka N. Halgamuge
2011 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Autorun Hack tool Malware a b s t r a c t Information security risks associated with Universal Serial Bus (USB) storage devices have been serious issues since 2003, which marked the wide adoption of USB  ...  Due to the insecure design and the open standards of USB technologies, attackers have successfully exploited various vulnerabilities in USB protocols, USB embedded security software, USB drivers, and Windows  ...  Vulnerabilities in USB drives' security software resulted in security protection bypass on both password-protected and fingerprint-protected USB drives.  ... 
doi:10.1016/j.diin.2011.02.001 fatcat:ogcnr5dcsbh7bfwr4av5jrkeuq

SoK: "Plug & Pray" Today – Understanding USB Insecurity in Versions 1 Through C

Jing Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam Bates, Kevin Butler
2018 2018 IEEE Symposium on Security and Privacy (SP)  
To address these challenges, the security community has responded with a growing set of fragmented defenses.  ...  Based on our taxonomy, we discover that USB attacks often abuse the trust-by-default nature of the ecosystem, and transcend different layers within a software stack; none of the existing defenses provide  ...  ACKNOWLEDGEMENT This work is supported in part by the US National Science Foundation under grant numbers CNS-1540217, CNS-1564140, CNS-1657534, CNS-1505790, and CNS-1518741, and by the Department of Energy  ... 
doi:10.1109/sp.2018.00037 dblp:conf/sp/TianSKBBB18 fatcat:szwfhcvsvvhxrclx5ataygmj6i

Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments

Manghui Tu, Kimberly Spoa-Harty, Liangliang Xiao
2015 Journal of Digital Forensics, Security and Law  
First, a novel approach is provided to model internal threat, specifically inside activities.  ...  As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information.  ...  Data Loss Threat Vectors Identification Data Loss Analysis A 90-day time period data collection is conducted prior to the deployment of any end point security protection technology (denoted as /P).  ... 
doi:10.15394/jdfsl.2015.1196 fatcat:lxkmeyucdnaghiq5ycti6qnanq

An Extensive Formal Analysis of Multi-factor Authentication Protocols

Charlie Jacomme, Steve Kremer
2021 ACM Transactions on Privacy and Security  
We formalize this model in the applied pi calculus and perform an extensive analysis and comparison of several widely used protocols—variants of Google 2-step and FIDO's U2F (Yubico's Security Key token  ...  In this article, we define a detailed threat model for this kind of protocol: While in classical protocol analysis attackers control the communication network, we take into account that many communications  ...  Moreover, our security analysis is grounded in a formal model using automated analysis techniques.  ... 
doi:10.1145/3440712 fatcat:z2nbvtrkyfap5pubtdssuut4zi

Secure and Efficient Authentication Protocol on Cloud: Survey

Sunghyuck Hong
2016 Indian Journal of Science and Technology  
upon a certain number of password errors for the loss in data protection that recovery is impossible or location.  ...  Methods/Statistical Analysis: The use of authentication and access control technology authorized users only and is limited to random replicates data by providing secure area, to initialize the data stored  ...  Image drive method using a virtual image drive and provides a secure area drive only when the user authentication.  ... 
doi:10.17485/ijst/2016/v9i37/102544 fatcat:w3sh45k4mvfzfae622arnzghy4

Defending Against Malicious USB Firmware with GoodUSB

Dave Jing Tian, Adam Bates, Kevin Butler
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
GoodUSB includes a security image component to simplify use, and a honeypot mechanism for observing suspicious USB activities.  ...  We observe that the root cause of such attacks is that the USB Stack exposes a set of unrestricted device privileges and note that the most reliable information about a device's capabilities comes from  ...  Even when considering "secure" USB devices, there is still a need for a defensive layer to protect from BadUSB attacks.  ... 
doi:10.1145/2818000.2818040 dblp:conf/acsac/TianBB15 fatcat:x4rdil67x5f23ocutrkgxiyuau

Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity

Ahmed Alamer, Ben Soh, Ahmed H. Alahmadi, David E. Brumbaugh
2019 IEEE Access  
We propose the use of a lowpower RFID-compatible device to provide a secure solution for exchanging and storing IVs and key pairs in the absence of an internet or wireless connection.  ...  In addition, establishing a secure system when the internet is unavailable and finding a secure method to share keys are challenges that must be addressed.  ...  The security of this device relies on a trusted record keeper (R) and a secure flash drive (SD).  ... 
doi:10.1109/access.2019.2954413 fatcat:vqdy65c7nfdvdb3xalib5i5y5m

Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions

Laiali Almazaydeh, Jun Zhang, Peiqiao Wu, Ruoqi Wei, Yisheng Cheng, Khaled Elleithy
2017 Computer and Information Science  
Due its universality, Universal Serial Bus (USB) has become the major connecting port of modern computers.  ...  Thus, third party organizations and research teams start to take over the problem of "BadUSB" and focus on discovering its solution. In this paper ,we introduce an approach to protect against BadUSB.  ...  The USB controller chips, including those in USB flash drive, have no protection from such reprogramming.  ... 
doi:10.5539/cis.v11n1p1 fatcat:xplmdvqfpbcbndxoa37udfq4em

Secure USB bypassing tool

Jewan Bang, Byeongyeong Yoo, Sangjin Lee
2010 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Digital evidence collection USB flash drive Authentication bypass tools a b s t r a c t As storage capacity increases due to development of flash memory techniques, use of USB memory has increased.  ...  In this context, use of USB memories that provide security functions to protect the data in them is increasing.  ...  Acknowledgments This research was supported by Bio R&D program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (20090084147) . r e f e r e  ... 
doi:10.1016/j.diin.2010.05.014 fatcat:htxn4oksgjcgzpgryygsw2pjku

Enabling on-body transmissions with commodity devices

Mehrdad Hessar, Vikram Iyer, Shyamnath Gollakota
2016 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '16  
Finally, by modulating the operations of these input devices, we demonstrate bit rates of up to 50 bits per second over the human body.  ...  Specifically, we show that commodity input devices such as fingerprint sensors and touchpads can be used to transmit information to only wireless receivers that are in contact with the body.  ...  This work was funded in part by the Intel Science and Technology Center for Pervasive Computing, a Google faculty award and National Science Foundation grants.  ... 
doi:10.1145/2971648.2971682 dblp:conf/huc/HessarIG16 fatcat:f3mlrtzik5eilarexgecx3ruka
« Previous Showing results 1 — 15 out of 1,048 results