Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

BadUSB 취약점 분석 및 대응 방안

Full metadata record
DC Field Value Language
dc.contributor.author서준호-
dc.contributor.author문종섭-
dc.date.accessioned2021-09-03T12:40:11Z-
dc.date.available2021-09-03T12:40:11Z-
dc.date.created2021-06-17-
dc.date.issued2017-
dc.identifier.issn1975-5066-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/85559-
dc.description.abstractAs the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can’t detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation.-
dc.languageKorean-
dc.language.isoko-
dc.publisher대한임베디드공학회-
dc.titleBadUSB 취약점 분석 및 대응 방안-
dc.title.alternativeAnalysis and Countermeasure for BadUSB Vulnerability-
dc.typeArticle-
dc.contributor.affiliatedAuthor문종섭-
dc.identifier.doi10.14372/IEMEK.2017.12.6.359-
dc.identifier.bibliographicCitation대한임베디드공학회논문지, v.12, no.6, pp.359 - 368-
dc.relation.isPartOf대한임베디드공학회논문지-
dc.citation.title대한임베디드공학회논문지-
dc.citation.volume12-
dc.citation.number6-
dc.citation.startPage359-
dc.citation.endPage368-
dc.type.rimsART-
dc.identifier.kciidART002305420-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorBadUSB-
dc.subject.keywordAuthorIntegrity-
dc.subject.keywordAuthorBootloader-
dc.subject.keywordAuthorFirmware-
dc.subject.keywordAuthorCode signing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Electronics and Information Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE