Researchers turn USB cable into attack tool 報告人:劉旭哲.

Slides:



Advertisements
Similar presentations
What is Computer Software?. Hardware vs Software Got to have both to get the job done!
Advertisements

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Chapter 8: Operating Systems and Utility Programs
Lecture 6 Testing and Debugging on a Physical Android Device and other Power User Stuff.
Getting started with LEGO NXT Mindstorms software This is intended to be a short introduction to the LEGO Mindstorms software and programming the LEGO.
Objectives Overview Define an operating system
Creating a Program In today’s lesson we will look at: what programming is different types of programs how we create a program installing an IDE to get.
Extend Your UFT for Mobile Testing & Monitoring Mobile Add-on For UFT Nov 2014.
IS Fall 2009 Chapter 3 9/2/2009. Epidemics and Health H1N1 – Younger are more at risk – Easily spread in crowds (like classes) Two of your lowest.
ANDROID PROGRAMMING MODULE 1 – GETTING STARTED
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems System Software Chapter 4.
The Operating System The operation system (OS) is a set of programs that coordinates: Hardware functions Interaction between application software and computer.
Software Development. Chapter 3 – Your first Windows 8 app.
JR3PCI by J. Norberto Pires Installation Example.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Type of Software There are two main types of software They are System software Application software Hardware System Software (OS) Application Software.
Chapter 4 System Software.
Overview of Windows and Microsoft Word. Operating System Performs 3 functions –Controls the hardware of the computer Screen, keyboard, disk drives, etc.
Computer Software Computer Technology Day 5. Software  Provides step-by-step instructions that tell the computer how to perform  Categories  System.
Explain the purpose of an operating system
DSM-260. Features Streaming Stream photos and videos from a mobile device, laptop, or network storage drive Stream music to your audio system Stream your.
Android WebKit browser exploit 報告者:劉旭哲. Nov, Alert Logic Researcher M.J.Keith show a exploit in the Webkit in the Android. This exploit could lead to.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer main parts HARDWARE It corresponds to all physical and tangible parts of a computer: your electrical, electronic, electromechanical and mechanical.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Operating Systems. An operating system (os) is a software program that enables the computer hardware to communicate and operate with the computer software.
Android. What is Android? A mobile device operating system. Seen primary in tablets and Cellphones. Based on a Linux kernel. Applications are Java Based.
HTC Android Projector User Guide v Agenda Setup and Demo Environment Launch Projector Installer Launch Projector Application Q&A.
Systems Software. Systems software Applications software such as word processing, spreadsheet or graphics packages Operating systems software to control.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
Booting Process Chapter 4: System Software Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
Transfer Contacts from iPhone to Android From:
LOGO iPhone to Galaxy Note Transfer Transfer iPhone Data to Galaxy Note 3/Note 4/Note 5/Note Edge.
For more information on Rouge, visit:
Full Review of Jihosoft Android Data Recovery
Submitted By: Tarun Tyagi Website- - Enable USB Debugging.
How to root Android Phone and Tablet for free and safe.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
L661 Software Flashing using Windows XP PC Only. Step 1- install drivers, Connect handset with the PC using USB cable, unzip folder and then install the.
How to Send Text Messages from PC to iPhoneHow to Send Text Messages from PC to iPhone? Q: Is there a way to read and send text messages (SMS) from a PC.
Recover Deleted Contacts from Android Mobiles and SIM Cards Android is becoming more and more popular for its openness. The open feature allows any mobile.
How To Uninstall HP Printer Drivers From Your PC?.
Find a Driver For HP 7150 Series Printer in Windows 7, 8 and XP.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Macintosh & Linux Used to fill in pg 5 & 6 of “Operating Systems” Packet.
System Software EIT, © Author Gay Robertson, 2016.
Basic Troubleshooting Techniques
Fun With (Wi-Fi) Pineapples
Module 1.1 Introduction to computers
What is an Operating System?
MIT App Inventor By Hans Yip.
مقدمة في الاردنيو د فضل الاكوع.
Chapter 4.
CS323 Android Getting Started
Using K2 applications How can users interact with K2 applications?
WHAT IS WINDOWS MULTIPOINT SERVER 2012?
Entry Level Computing Year NINE –
Chromebook Basics For NWCSD
Korea Software HRD Center
Downloading to the NXT requires the correct hardware setup
Presentation transcript:

Researchers turn USB cable into attack tool 報告人:劉旭哲

Two researchers have figured out a way to attack laptops and smartphones through an innocent- looking USB cable. Angelos Stavrou, an assistant professor at George Mason University Student Zhaohui Wang Software that changes the functionality of the USB driver Launch a surreptitious attack while someone is charging a smartphone or syncing data between a smartphone and a computer.

The exploit works by – Adding keyboard or mouse functionality to the connection – Attacker can start typing commands or click the mouse in order to take control of the computer. The exploit is enabled because the USB protocol can be used to connect any device to a computing platform without authentication

On Macintosh and Windows machines, a message pops up – Saying the system has detected a new human interface device – There is no easily recognizable way to halt the process

The researchers wrote the exploit for Android devices only at this point It can work on any computing device that uses USB, It can work between two smartphones by connecting a USB cable between then.

The original compromise can happen by downloading the exploit from the Web or running an app that is compromised. The researchers have created exploit software to run on a computer, and an exploit to run on Android that is a modification of the Android operating system kernel. Scripts can then be written for the actual attack.

Antivirus software wouldn't necessarily stop this because it can't tell that the activities of the exploit are not controlled or sanctioned by the user. It's hard to separate good behavior from bad behavior when it comes from the keyboard.

html?part=rss&tag=feed&subj=News- Security