Nothing Special   »   [go: up one dir, main page]

Vouteva et al., 2015 - Google Patents

Feasibility and deployment of bad usb

Vouteva et al., 2015

View PDF
Document ID
3117258937819180240
Author
Vouteva S
Verbij R
Roos J
Publication year
Publication venue
University of Amsterdam, System and Network Engineering Master Research Project

External Links

Snippet

Social engineering and the usage of USB sticks for an attack has been proven very effective over the years. People have been warned over and over again not to plug in mass storage devices that they have not purchased themselves. Computer defenses are developed to …
Continue reading at rp.os3.nl (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Zheng et al. A survey on the moving target defense strategies: An architectural perspective
Binsalleeh et al. On the analysis of the zeus botnet crimeware toolkit
Sood et al. An empirical study of HTTP-based financial botnets
Sood et al. Dissecting SpyEye–Understanding the design of third generation botnets
WO2009094371A1 (en) Trusted secure desktop
Ibarra et al. Ransomware impact to SCADA systems and its scope to critical infrastructure
Min et al. Antivirus security: naked during updates
Wong et al. Threat modeling and security analysis of containers: A survey
Stealer Intelligence report
Vouteva et al. Feasibility and deployment of bad usb
Cannoles et al. Hacking experiment by using usb rubber ducky scripting
Anghel et al. A note on different types of ransomware attacks
Snihurov et al. Experimental studies of ransomware for developing cybersecurity measures
Sethi et al. Trusted-Cloud: A Cloud Security Model for Infrastructure as a Service (IaaS)
Kakareka What Is Vulnerability Assessment?
Emmert Out-of-band network management
Abdulrahman Multi-Level Windows Exploitation Using Linux Operating System
Duc Offensive Security Lab
Simko SOC Detection Capabilities Testing Environment
Rahalkar et al. Metasploit Revealed: Secrets of the Expert Pentester: Build your defense against complex attacks
Nakamoto et al. Desktop demilitarized zone
Kesavan et al. Gaining access to windows machine by installing backdoor
Vinay et al. A comparison of three sophisticated cyber weapons
Ács-Kurucz et al. An independent test of APT attack detection appliances
Pradhan et al. A Review on Assessing Extent of Malware Damage and Basic Countermeasures