USB attacks explained (Krzysztof Opasiak, LVEE-2017) — различия между версиями
Материал из 0x1.tv
StasFomin (обсуждение | вклад) (Новая страница: «;{{SpeakerInfo}}: {{Speaker|Krzysztof Opasiak}} <blockquote> USB is the most common external interface in the world. Even machines which, for security reasons, ar…») |
StasFomin (обсуждение | вклад) |
||
;{{SpeakerInfo}}: {{Speaker|Krzysztof Opasiak}} <blockquote> USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers. USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks. </blockquote> {{VideoSection}} {{vimeoembed|223913380|800|450}} <!-- {{youtubelink|}} --> {{SlidesSection}} [[File:USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf|left|page=-|300px]] {{----}} == Thesis == {{LinksSection}} * [https://lvee.org/ru/abstracts/243 Talks page] <!-- <blockquote>[©]</blockquote> --> <references/> [[Категория:Linux]] [[Категория:Open-source]] [[Категория:LVEE-2017]] [[Категория:Draft]] |
Версия 10:04, 3 июля 2017
- Докладчик
- Krzysztof Opasiak
USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers. USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks.
Содержание
Видео
Презентация
Thesis
Примечания и ссылки