Hardware-based Cyber Threats
Thiago Alves, Thomas Morris
2018
Abstract
During the last decade, cyber-security experts have been trying to mitigate attacks against computer networks and software. After the internet, the proliferation of thousands of virus, worms and trojans became easier, which then required enhancements for Operating Systems, browsers and anti-virus software in order to keep their users safe. However, what happens when the threat comes from the hardware? The Operating System trusts entirely in the hardware to perform its operations. If the hardware has been taken, it becomes much harder to regain control of the system. This paper describes eight different approaches to hardware attacks against software. It also demonstrates how to perform an attack using a USB device patched to behave like a generic HID Input Device, in order to insert malicious code in the system.
DownloadPaper Citation
in Harvard Style
Alves T. and Morris T. (2018). Hardware-based Cyber Threats.In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-282-0, pages 259-266. DOI: 10.5220/0006577202590266
in Bibtex Style
@conference{icissp18,
author={Thiago Alves and Thomas Morris},
title={Hardware-based Cyber Threats},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2018},
pages={259-266},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006577202590266},
isbn={978-989-758-282-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Hardware-based Cyber Threats
SN - 978-989-758-282-0
AU - Alves T.
AU - Morris T.
PY - 2018
SP - 259
EP - 266
DO - 10.5220/0006577202590266