Vouteva et al., 2015 - Google Patents
Feasibility and deployment of bad usbVouteva et al., 2015
View PDF- Document ID
- 3117258937819180240
- Author
- Vouteva S
- Verbij R
- Roos J
- Publication year
- Publication venue
- University of Amsterdam, System and Network Engineering Master Research Project
External Links
Snippet
Social engineering and the usage of USB sticks for an attack has been proven very effective over the years. People have been warned over and over again not to plug in mass storage devices that they have not purchased themselves. Computer defenses are developed to …
- 238000003860 storage 0 abstract description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zheng et al. | A survey on the moving target defense strategies: An architectural perspective | |
Binsalleeh et al. | On the analysis of the zeus botnet crimeware toolkit | |
Sood et al. | An empirical study of HTTP-based financial botnets | |
Sood et al. | Dissecting SpyEye–Understanding the design of third generation botnets | |
WO2009094371A1 (en) | Trusted secure desktop | |
Ibarra et al. | Ransomware impact to SCADA systems and its scope to critical infrastructure | |
Min et al. | Antivirus security: naked during updates | |
Wong et al. | Threat modeling and security analysis of containers: A survey | |
Stealer | Intelligence report | |
Vouteva et al. | Feasibility and deployment of bad usb | |
Cannoles et al. | Hacking experiment by using usb rubber ducky scripting | |
Anghel et al. | A note on different types of ransomware attacks | |
Snihurov et al. | Experimental studies of ransomware for developing cybersecurity measures | |
Sethi et al. | Trusted-Cloud: A Cloud Security Model for Infrastructure as a Service (IaaS) | |
Kakareka | What Is Vulnerability Assessment? | |
Emmert | Out-of-band network management | |
Abdulrahman | Multi-Level Windows Exploitation Using Linux Operating System | |
Duc | Offensive Security Lab | |
Simko | SOC Detection Capabilities Testing Environment | |
Rahalkar et al. | Metasploit Revealed: Secrets of the Expert Pentester: Build your defense against complex attacks | |
Nakamoto et al. | Desktop demilitarized zone | |
Kesavan et al. | Gaining access to windows machine by installing backdoor | |
Vinay et al. | A comparison of three sophisticated cyber weapons | |
Ács-Kurucz et al. | An independent test of APT attack detection appliances | |
Pradhan et al. | A Review on Assessing Extent of Malware Damage and Basic Countermeasures |