Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol

被引:0
|
作者
Mahboubi, Arash [1 ]
Camtepe, Seyit [2 ]
Morarji, Hasmukh [1 ]
机构
[1] Queensland Univ Technol, Elect & Comp Engn, Brisbane, Qld, Australia
[2] CSIRO, Data61, Sydney, NSW, Australia
关键词
USB security; USB attack surface; Internet of Things (IoT); mobile malware; Coloured Petri Nets (CPN) modelling; epidemic model; PROPAGATION; MALWARE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A privately owned smart device connected to a corporate network using a USB connection creates a potential channel for malware infection and its subsequent spread. For example, air-gapped (a.k.a. isolated) systems are considered to be the most secure and safest places for storing critical datasets. However, unlike network communications, USB connection streams have no authentication and filtering. Consequently, intentional or unintentional piggybacking of a malware infected USB storage or a mobile device through the air-gap is sufficient to spread infection into such systems. Our findings show that the contact rate has an exceptional impact on malware spread and destabilizing free malware equilibrium. This work proposes a USB authentication and delegation protocol based on radiofrequency identification (RFID) in order to stabilize the free malware equilibrium in air-gapped networks. The proposed protocol is modelled using Coloured Petri nets (CPN) and the model is verified and validated through CPN tools.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] LADP: A Lightweight Authentication and Delegation Protocol for RFID Tags
    Li, Gaochao
    Xu, Xiaolin
    Li, Qingshan
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 860 - 865
  • [2] Replay Attack on Lightweight CAN Authentication Protocol
    Noureldeen, Pakinam
    Azer, Marianne A.
    Refaat, Ahmed
    Alam, Mahmoud
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 600 - 606
  • [3] Insider Attack Prevention: LAPUP—Lightweight Authentication Protocol Using PUF
    Rajamanickam S.
    Vollala S.
    Ramasubramanian N.
    Journal of Communications and Information Networks, 2024, 9 (02) : 192 - 206
  • [4] A lightweight RFID authentication protocol using qubits against relay attack
    Zhu, Hong Feng
    Wang, Rui
    Liu, Jun Lin
    Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (04): : 874 - 883
  • [5] METAHEURISTIC TRACEABILITY ATTACK AGAINST SLMAP, AN RFID LIGHTWEIGHT AUTHENTICATION PROTOCOL
    Hernandez-Castro, Julio Cesar
    Estevez-Tapiador, Juan Manuel
    Peris-Lopez, Pedro
    Clark, John A.
    Talbi, El-Ghazali
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2012, 23 (02) : 543 - 553
  • [6] Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol
    Hernandez-Castro, Julio C.
    Tapiador, Juan E.
    Peris-Lopez, Pedro
    Clark, John A.
    Talbi, El-Ghazali
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5, 2009, : 2265 - +
  • [7] Reducing Attack Surface with Container Transplantation for Lightweight Sandboxing
    Nakata, Yuki
    Suzuki, Shintaro
    Matsubara, Katsuya
    PROCEEDINGS OF THE 14TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2023, 2023, : 58 - 64
  • [8] Active attack against HB+:: a provably secure lightweight authentication protocol
    Gilbert, H
    Robshaw, M
    Sibert, H
    ELECTRONICS LETTERS, 2005, 41 (21) : 1169 - 1170
  • [9] Lightweight authentication protocol (LAP)
    Chousiadis, C
    Pangalos, G
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 7 - 12
  • [10] On a Lightweight Authentication Protocol for RFID
    Nastase, George-Daniel
    Tiplea, Ferucio Laurentiu
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 212 - 225