Rogers, 2014 - Google Patents
A survey of the hazards of using USB as a universal charging standard as pertains to smart devicesRogers, 2014
View PDF- Document ID
- 15569077075375690891
- Author
- Rogers M
- Publication year
External Links
Snippet
Abstract The Universal Serial Bus protocol was designed to be, and has become, the single standard used for interfacing with computer peripherals and electronic components. The proliferation of this protocol has resulted in USB power outlets in public places being a …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11120126B2 (en) | Method and system for preventing and detecting security threats | |
Nissim et al. | USB-based attacks | |
Shabtai et al. | Google android: A state-of-the-art review of security mechanisms | |
Tian et al. | SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C | |
Chell et al. | The mobile application hacker's handbook | |
Schmidt | Detection of smartphone malware | |
Walls et al. | A review of free cloud-based anti-malware apps for android | |
Zhao et al. | An overview of mobile devices security issues and countermeasures | |
Xu et al. | Security enhancement of secure USB debugging in Android system | |
Oliveira et al. | Honeypotlabsac: a virtual honeypot framework for android | |
Muttik | Securing mobile devices: Present and future | |
Zakaria et al. | Review on mobile attacks: Operating system, threats and solution | |
Aldoseri et al. | A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components | |
Mancini | Modern mobile platforms from a security perspective | |
Rogers | A survey of the hazards of using USB as a universal charging standard as pertains to smart devices | |
Walls et al. | A study of the effectiveness abs reliability of android free anti-mobile malware apps | |
Ecarma et al. | Vulnerability assessment and attack simulation on a rooted Android device | |
Grimes | Are Apple's security measures sufficient to protect its mobile devices? | |
Blåfield | Different types of keyloggers: Mitigation and risk relevancy in modern society | |
Krishnan | Android hypovisors: Securing mobile devices through high-performance, light-weight, subsystem isolation with integrity checking and auditing capabilities | |
Lima et al. | An Introduction to Mobile Device Security | |
Sarga et al. | Mobile Cyberwarfare Threats and Mitigations: An Overview | |
Stavrou | Android malware network traffic detection using visual representation (AF) | |
Taylor et al. | Attacking Smartphone Security and Privacy | |
Kovah et al. | Betting BIOS Bugs Won’t Bite Y’er Butt? |