USB attacks explained (Krzysztof Opasiak, LVEE-2017)

Материал из 0x1.tv


Speaker
Krzysztof Opasiak.jpg
Krzysztof Opasiak

USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers. USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks.

Содержание

Video

on youtube

Посмотрели доклад? Понравился? Напишите комментарий! Не согласны? Тем более напишите.

Slides

USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf

Thesis

Links

USB attacks explained (Krzysztof Opasiak, LVEE-2017)!.jpg

Plays:116   Comments:0