USB attacks explained (Krzysztof Opasiak, LVEE-2017) — различия между версиями
Материал из 0x1.tv
StasFomin (обсуждение | вклад) (Batch edit: replace PCRE (\n\n)+(\n) with \2) |
StasFomin (обсуждение | вклад) |
||
;{{SpeakerInfo}}: {{Speaker|Krzysztof Opasiak}}
<blockquote>
USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers. USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks.
</blockquote>
{{VideoSection}}
{{vimeoembed|223913380|800|450}}
{{youtubelink|hjaVq3w_Tus}}{{letscomment}}
{{SlidesSection}}
[[File:USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf|left|page=-|300px]]
{{----}}
== Thesis == | |||
Текущая версия на 06:12, 20 октября 2025
- Speaker
- Krzysztof Opasiak
USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers. USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks.
Video
Slides
Thesis
Links
Plays:116 Comments:0

