USB attacks explained (Krzysztof Opasiak, LVEE-2017) — различия между версиями

Материал из 0x1.tv

(Новая страница: «;{{SpeakerInfo}}: {{Speaker|Krzysztof Opasiak}} <blockquote> USB is the most common external interface in the world. Even machines which, for security reasons, ar…»)
 
;{{SpeakerInfo}}: {{Speaker|Krzysztof Opasiak}}
<blockquote>
USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers.  USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks.
</blockquote>

{{VideoSection}}

{{vimeoembed|223913380|800|450}}
<!-- {{youtubelink|}} -->

{{SlidesSection}}
[[File:USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf|left|page=-|300px]]

{{----}}

== Thesis ==

{{LinksSection}}
* [https://lvee.org/ru/abstracts/243 Talks page]
<!-- <blockquote>[©]</blockquote> -->


<references/>

[[Категория:Linux]]
[[Категория:Open-source]]
[[Категория:LVEE-2017]]
[[Категория:Draft]]

Версия 10:04, 3 июля 2017

Докладчик
Krzysztof Opasiak.jpg
Krzysztof Opasiak

USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers. USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks.

Видео

Презентация

USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf

Thesis

Примечания и ссылки