BadUSB 취약점 분석 및 대응 방안
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 서준호 | - |
dc.contributor.author | 문종섭 | - |
dc.date.accessioned | 2021-09-03T12:40:11Z | - |
dc.date.available | 2021-09-03T12:40:11Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2017 | - |
dc.identifier.issn | 1975-5066 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/85559 | - |
dc.description.abstract | As the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can’t detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation. | - |
dc.language | Korean | - |
dc.language.iso | ko | - |
dc.publisher | 대한임베디드공학회 | - |
dc.title | BadUSB 취약점 분석 및 대응 방안 | - |
dc.title.alternative | Analysis and Countermeasure for BadUSB Vulnerability | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | 문종섭 | - |
dc.identifier.doi | 10.14372/IEMEK.2017.12.6.359 | - |
dc.identifier.bibliographicCitation | 대한임베디드공학회논문지, v.12, no.6, pp.359 - 368 | - |
dc.relation.isPartOf | 대한임베디드공학회논문지 | - |
dc.citation.title | 대한임베디드공학회논문지 | - |
dc.citation.volume | 12 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 359 | - |
dc.citation.endPage | 368 | - |
dc.type.rims | ART | - |
dc.identifier.kciid | ART002305420 | - |
dc.description.journalClass | 2 | - |
dc.description.journalRegisteredClass | kci | - |
dc.subject.keywordAuthor | BadUSB | - |
dc.subject.keywordAuthor | Integrity | - |
dc.subject.keywordAuthor | Bootloader | - |
dc.subject.keywordAuthor | Firmware | - |
dc.subject.keywordAuthor | Code signing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.