2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) 2012
DOI: 10.1109/crisis.2012.6378948
|View full text |Cite
|
Sign up to set email alerts
|

A honeypot for arbitrary malware on USB storage devices

Abstract: Abstract-Malware is a serious threat for modern information technology. It is therefore vital to be able to detect and analyze such malicious software in order to develop contermeasures. Honeypots are a tool supporting that task-they collect malware samples for analysis. Unfortunately, existing honeypots concentrate on malware that spreads over networks, thus missing any malware that does not use a network for propagation.A popular network-independent technique for malware to spread is copying itself to USB fl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Poeplau et al [22] present a honeypot that is able to emulate removable USB-devices. Therefore, they target malware that spreads via removable media.…”
Section: Related Workmentioning
confidence: 99%
“…Poeplau et al [22] present a honeypot that is able to emulate removable USB-devices. Therefore, they target malware that spreads via removable media.…”
Section: Related Workmentioning
confidence: 99%
“…However, according to [13], one of the major weaknesses of the USB protocol is its flexibility, and potential threats increase if the device is connected to other devices, networks or the Internet [14]. An infected computer might uncover confidential information or personal data, participate in distributed attacks against other computer systems [15], or it might sabotage computer-controlled industrial processes. As explained in [16,17], a regular user may plug a USB flash drive found on the ground into a corporate computer without knowing that it may be an infected device, ready to start an attack.…”
Section: Related Workmentioning
confidence: 99%
“…The SCADA honeypot proposals discussed so far focused on the assumption that attacks are network borne. In 2012 students at Bonn University in Germany, led by Sebastian Poeplau, created Ghost USB, a honeypot which emulates USB devices to counter the threat of malware that propagated by removable media [56]. Currently, Ghost USB supports 32bit Windows XP/7 and is supported by the Honeynet Project.…”
Section: Attribution Of Cyber Attacks On Industrial Control Systemsmentioning
confidence: 99%