timing fingerprints. Paper presented at the 2022 IEEE
Symposium on Security and Privacy (SP).
Davis, A. (2011). USB-undermining security barriers.
Black Hat Briefings.
Denney, K., Erdin, E., Babun, L., Vai, M., & Uluagac, S.
(2019). Usb-watch: a dynamic hardware-assisted usb
threat detection framework. Paper presented at the
International Conference on Security and Privacy in
Communication Systems.
Hill, M. (2022). BadUSB explained: How rogue USBs
threaten your organization. CSO Online. Retrieved
from https://www.csoonline.com/article/3647173/
badusb-explained-how-rogue-usbs-threaten-your-
organization.html
Honeywell. (2022). Honeywell Industrial USB Threat
Report. Retrieved from Houston: https://
honeywellprocess.blob.core.windows.net/public/Mark
eting/Honeywell-USB-Threat-Report.pdf
Johnson, P. C. (2014). How USB Does (and Doesn’t)
Work: A Security Perspective. Security, 39(4), 12-15.
Karystinos, E., Andreatos, A., & Douligeris, C. (2019).
Spyduino: Arduino as a HID exploiting the BadUSB
vulnerability. Paper presented at the 2019 15th
International Conference on Distributed Computing in
Sensor Systems (DCOSS).
Lawal, D., Gresty, D. W., Gan, D., & Hewitt, L. (2021).
Have You Been Framed and Can You Prove It? Paper
presented at the 2021 44th International Convention on
Information, Communication and Electronic
Technology (MIPRO).
Loe, E. L., Hsiao, H.-C., Kim, T. H.-J., Lee, S.-C., &
Cheng, S.-M. (2016). SandUSB: An installation-free
sandbox for USB peripherals. Paper presented at the
2016 IEEE 3rd World Forum on Internet of Things
(WF-IoT).
Mir, H., Wong, S., & Manahan, B. (2022). Top Attack
Vectors: January 2022. Retrieved from https://expel.
com/blog/top-attack-vectors-january-2022/
Nasution, S. M., Purwanto, Y., Virgono, A., & Alam, G. C.
(2014). Integration of kleptoware as keyboard
keylogger for input recorder using teensy USB
development board. Paper presented at the
Telecommunication Systems Services and Applications
(TSSA), 2014 8th International Conference on.
Neuner, S. (2017). Bad things happen through USB. Wien,
Neuner, S., Voyiatzis, A. G., Fotopoulos, S., Mulliner, C.,
& Weippl, E. R. (2018). Usblock: Blocking usb-based
keypress injection attacks. Paper presented at the IFIP
Annual Conference on Data and Applications Security
and Privacy.
Nissim, N., Yahalom, R., & Elovici, Y. (2017). USB-based
attacks. Computers & Security, 70, 675-688.
Nohl, K., & Lell, J. (2014). BadUSB-On accessories that
turn evil. Black Hat USA, 1(9), 1-22.
Pham, D. V., Syed, A., & Halgamuge, M. N. (2011).
Universal serial bus based software attacks and
protection solutions. Digital Investigation, 7(3-4), 172-
184.
Pmsosa. (2020). Duckhunt: Prevent Rubberducky (or other
keystroke injection) attacks, DuckHunter. Retrieved
from https://github.com/pmsosa/duckhunt
Raghavan, R. (2020). An Introduction to Bad USB Attacks.
Retrieved from https://acodez.in/badusb-attack/
Rose, A. (2022). Cybercriminals bring the USB back,
with a vengeance. Retrieved from https://
www.itp.net/opinion/cybercriminals-bring-the-usb-back
-with-a-vengeance#:~:text=More%20than%20half%20
(54%25),environment%20as%20an%20acceptable%2
0option.
Scaife, N., Peeters, C., & Traynor, P. (2018). Fear the
reaper: Characterization and fast detection of card
skimmers. Paper presented at the 27th USENIX
Security Symposium (USENIX Security 18).
Singh, D., Biswal, A. K., Samanta, D., Singh, D., & Lee,
H.-N. (2022). Juice Jacking: Security Issues and
Improvements in USB Technology. Sustainability,
14(2), 939.
Techopedia. (2019, November). What Does Human
Interface Device (HID) Mean. Retrieved from
https://www.techopedia.com/definition/19781/human-
interface-device-hid
Tian, D., Bates, A., Butler, K. R., & Rangaswami, R.
(2016). Provusb: Block-level provenance-based data
protection for usb storage devices. Paper presented at
the Proceedings of the 2016 ACM SIGSAC Conference
on Computer and Communications Security.
Ticu, M. (2021). USB Traffic Analyzer-digUSB. Paper
presented at the 2021 12th International Symposium on
Advanced Topics in Electrical Engineering (ATEE).
Tischer, M., Durumeric, Z., Foster, S., Duan, S., Mori, A.,
Bursztein, E., & Bailey, M. (2016). Users really do plug
in USB drives they find. Paper presented at the 2016
IEEE Symposium on Security and Privacy (SP).
Vigderman, A., & Turner, G. (2022). How Does
Antivirus Software Work? Retrieved from https://
www.security.org/antivirus/how-does-antivirus-work/
Wahanani, H., Idhom, M., & Kurniawan, D. (2020). Exploit
remote attack test in operating system using arduino
micro. Paper presented at the Journal of Physics:
Conference Series.
Yang, B., Qin, Y., Zhang, Y., Wang, W., & Feng, D.
(2015). TMSUI: A trust management scheme of USB
storage devices for industrial control systems. Paper
presented at the International Conference on
Information and Communications Security.
Zhao, S., & Wang, X. A. (2019). A Survey of Malicious
HID Devices. Paper presented at the International
Conference on Broadband and Wireless Computing,
Communication and Applications.