USB attacks explained (Krzysztof Opasiak, LVEE-2017)

Материал из 0x1.tv


Speaker
Krzysztof Opasiak.jpg
Krzysztof Opasiak

USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers. USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks.

Содержание

Video

on youtube

Slides

USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf

Thesis

Links





Plays:0   Comments:0