You are here
FAU Collections » FAU Research Repository » FAU Student Research » FAU Undergraduate Student Research
Misuse Pattern: Keyboard Injection Through The USB Human Interface Device Class
- Date Issued:
- 2015
- Summary:
- We are presenting a misuse pattern, Keyboard Injection through the USB Human Interface Device(HID) class. This paper describes how such a misuse is performed from the view from an attacker, describes the systems involved in the misuse, analyzes methods of stopping or preventing the attack through potential security patterns, and details techniques that can be used to detect or trace such an attack after it has occurred. Such a pattern can inform IT managers, device manufacturers, or even device driver developers of the vulnerability, as well as detail methods or security patterns that can prevent an attack. A keyboard injection misuse attempts to infiltrate a system or network through a variety of techniques. Such a misuse impersonates a keyboard HID, which most systems inherently trust.
Title: | Misuse Pattern: Keyboard Injection Through The USB Human Interface Device Class. |
271 views
47 downloads |
---|---|---|
Name(s): |
To, Dyllan Fernandez, Eduardo B. College of Engineering and Computer Science |
|
Type of Resource: | text | |
Genre: | Poster | |
Date Issued: | 2015 | |
Publisher: | Florida Atlantic University Libraries: Digital Library | |
Physical Form: | ||
Extent: | 1 p. | |
Language(s): | English | |
Summary: | We are presenting a misuse pattern, Keyboard Injection through the USB Human Interface Device(HID) class. This paper describes how such a misuse is performed from the view from an attacker, describes the systems involved in the misuse, analyzes methods of stopping or preventing the attack through potential security patterns, and details techniques that can be used to detect or trace such an attack after it has occurred. Such a pattern can inform IT managers, device manufacturers, or even device driver developers of the vulnerability, as well as detail methods or security patterns that can prevent an attack. A keyboard injection misuse attempts to infiltrate a system or network through a variety of techniques. Such a misuse impersonates a keyboard HID, which most systems inherently trust. | |
Identifier: | FA00005214 (IID) | |
Subject(s): | College students --Research --United States. | |
Persistent Link to This Record: | http://purl.flvc.org/fau/fd/FA00005214 | |
Host Institution: | FAU |