2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2019
DOI: 10.1109/dcoss.2019.00066
|View full text |Cite
|
Sign up to set email alerts
|

Spyduino: Arduino as a HID Exploiting the BadUSB Vulnerability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…For example, an attacker can program a microcontroller so that when it connects, it opens a command prompt, enters, and executes a PowerShell command that will load the image and launch the virus. Such a device can be disguised as a flash drive, keyboard, or other peripheral equipment [13].…”
Section: Methods Of Overcoming Protection Using Vulnerabilities In Bmp Image File Formatmentioning
confidence: 99%
“…For example, an attacker can program a microcontroller so that when it connects, it opens a command prompt, enters, and executes a PowerShell command that will load the image and launch the virus. Such a device can be disguised as a flash drive, keyboard, or other peripheral equipment [13].…”
Section: Methods Of Overcoming Protection Using Vulnerabilities In Bmp Image File Formatmentioning
confidence: 99%
“…Other examples in this category are the USB Rubber Ducky [13], which poses as a benign USB thumb drive that can exfiltrate data from the victim host. Finally, Evilduino [14], USBdriveby [15], and Spyduino [16] are additional examples that are based on Arduino microcontrollers. On the surface, an O.MG cable appears to be a simple USB cable (left) (Image from [17]); however, such devices have a malicious microcontroller embedded at the connector side (right) (Image from [18]).…”
Section: Usb Attacksmentioning
confidence: 99%
“…Often, keystrokes injection based on BadUSB is used to drop malware on the victim's machine [28]. A terminal window is opened by emulating a corresponding keyboard shortcut.…”
Section: Cpu Interrupt Service Routinementioning
confidence: 99%
“…BadUSB devices are applied to drop and install malware on the victim's machine by mimicking keystrokes [28]. The Phantom Malware applies User Imitating to conceal the execution of all its malicious actions.…”
Section: ) Badusb Devices Based On Keystroke Injectionmentioning
confidence: 99%