[1]康云川,代 彦.恶意 USB 设备原理及防护措施研究[J].计算机技术与发展,2020,30(01):112-117.[doi:10. 3969 / j. issn. 1673-629X. 2020. 01. 020]
KANG Yun-chuan,DAI Yan.Research on Principles and Protection Measures of Malicious USB Devices[J].Computer Technology and Development,2020,30(01):112-117.[doi:10. 3969 / j. issn. 1673-629X. 2020. 01. 020]
点击复制
恶意 USB 设备原理及防护措施研究(
)
《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]
- 卷:
-
30
- 期数:
-
2020年01期
- 页码:
-
112-117
- 栏目:
-
安全与防范
- 出版日期:
-
2020-01-10
文章信息/Info
- Title:
-
Research on Principles and Protection Measures of Malicious USB Devices
- 文章编号:
-
1673-629X(2020)01-0112-06
- 作者:
-
康云川1 ; 代 彦2
-
1. 重庆三峡学院 计算机科学与工程学院,重庆 404000; 2. 重庆市文化信息中心,重庆 401121
- Author(s):
-
KANG Yun-chuan 1 ; DAI Yan 2
-
1. School of Computer Science and Engineering,Chongqing Three Gorges University,Chongqing 404000,China; 2. Chongqing Cultural Information Center,Chongqing 401121,China
-
- 关键词:
-
USB 安全; USB HID 攻击; 信息安全; BadUSB; Keylogger
- Keywords:
-
USB security; USB HID attack; information security; BadUSB; Keylogger
- 分类号:
-
TP309.1
- DOI:
-
10. 3969 / j. issn. 1673-629X. 2020. 01. 020
- 摘要:
-
在网络与信息安全领域中,计算机 USB 接口安全一直以来都面临着严峻的风险挑战,也是用户最容易忽略的问题,而恶意 USB 设备是计算机 USB 接口安全的主要威胁之一,它严重威胁着企业的信息安全与公民隐私信息安全。针对当前 USB 安全问题现状进行了分析,介绍了常见的恶意 USB 设备 Keylogger 与 BadUSB 的危害、攻击特性,对 Keylogger,BadUSB 硬件电路原理,硬件程序实现,攻击方法进行了详细剖析。通过 AVR 微控芯片构建出 Keylogger,BadUSB 设备,然后用其设备对计算机进行攻击实验,最终实现对目标主机的监听与控制,并研究拦截 Keylogger 记录监听与抵御 BadUSB攻击的安全防护措施,为用户提供有效的安全保护解决方案。这些防护措施与解决方案能有效地保护公共信息安全与个人信息安全,能遏制 USB 接口层面信息安全事件的发生。
- Abstract:
-
In the field of network and information security,computer USB interface security has been facing serious risks and challenges,but also the most easily ignored by users, while malicious USB device is one of the main threats to computer USB interface security,which seriously threatens the enterprise information security and citizen privacy information security. We analyze the present situation of USB security problems,introduce the harm and attack characteristics of common malicious USB devices Keylogger and BadUSB,? and analyze Keylogger,BadUSB hardware circuit principle,hardware program implementation,and attack methods in detail. The Keylogger,BadUSB devices are constructed by? ?AVR microchip,by which the attack experiments are carried out on the computer. Finally,the recording and control of the target host are realized,and the security protection measures of intercepting Keylogger record listening and resisting BadUSB attack are studied to provide users with effective security protection solutions.? These protection measures and solutions can effectively protect public information security and personal information security,and can curb the occurrence of information security events in the? ? ?USB interface field.
更新日期/Last Update:
2020-01-10