USB attacks explained (Krzysztof Opasiak, LVEE-2017)

Материал из 0x1.tv


Speaker
Krzysztof Opasiak.jpg
Krzysztof Opasiak

USB is the most common external interface in the world. Even machines which, for security reasons, are disconnected from the Internet often offer USB connectivity. This creates a new attacks surface for skilled hackers. USB implementation may be exploited on various levels. To effectively protect against such attack, knowledge about already exploited vulnerabilities is required. This paper is a survey of state-of-the-art USB-related attacks.

Содержание

Video[править вики-текст]

on youtube

Slides[править вики-текст]

USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf USB attacks explained (Krzysztof Opasiak, LVEE-2017).pdf

Thesis[править | править вики-текст]

Links[править вики-текст]

USB attacks explained (Krzysztof Opasiak, LVEE-2017)!.jpg

Plays:116   Comments:0