[go: nahoru, domu]

Rogers, 2014 - Google Patents

A survey of the hazards of using USB as a universal charging standard as pertains to smart devices

Rogers, 2014

View PDF
Document ID
15569077075375690891
Author
Rogers M
Publication year

External Links

Snippet

Abstract The Universal Serial Bus protocol was designed to be, and has become, the single standard used for interfacing with computer peripherals and electronic components. The proliferation of this protocol has resulted in USB power outlets in public places being a …
Continue reading at www.ideals.illinois.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
US11120126B2 (en) Method and system for preventing and detecting security threats
Nissim et al. USB-based attacks
Shabtai et al. Google android: A state-of-the-art review of security mechanisms
Tian et al. SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C
Chell et al. The mobile application hacker's handbook
Schmidt Detection of smartphone malware
Walls et al. A review of free cloud-based anti-malware apps for android
Zhao et al. An overview of mobile devices security issues and countermeasures
Xu et al. Security enhancement of secure USB debugging in Android system
Oliveira et al. Honeypotlabsac: a virtual honeypot framework for android
Muttik Securing mobile devices: Present and future
Zakaria et al. Review on mobile attacks: Operating system, threats and solution
Aldoseri et al. A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components
Mancini Modern mobile platforms from a security perspective
Rogers A survey of the hazards of using USB as a universal charging standard as pertains to smart devices
Walls et al. A study of the effectiveness abs reliability of android free anti-mobile malware apps
Ecarma et al. Vulnerability assessment and attack simulation on a rooted Android device
Grimes Are Apple's security measures sufficient to protect its mobile devices?
Blåfield Different types of keyloggers: Mitigation and risk relevancy in modern society
Krishnan Android hypovisors: Securing mobile devices through high-performance, light-weight, subsystem isolation with integrity checking and auditing capabilities
Lima et al. An Introduction to Mobile Device Security
Sarga et al. Mobile Cyberwarfare Threats and Mitigations: An Overview
Stavrou Android malware network traffic detection using visual representation (AF)
Taylor et al. Attacking Smartphone Security and Privacy
Kovah et al. Betting BIOS Bugs Won’t Bite Y’er Butt?