As an interface between human and computers, human interface device is supported by most computer systems. On behalf of user, HID devices can complete many operations including many sensitive operations with high authority. Exploiting this feature, attackers have designed and produced many malicious HID devices, imitating the user’s control. Meanwhile, most systems neglect to consider this security issue, posing great challenges to information security. In this regard, this paper reviews the development of malicious HID devices with analysis of technologies used. According to the technical characteristics, these devices are classified into three categories: Pure HID devices, composite devices with HID interface, malicious devices with wireless communication capabilities. Furthermore, this paper discusses the challenges and opportunities of related research.
CITATION STYLE
Zhao, S., & Wang, X. A. (2020). A Survey of Malicious HID Devices. In Lecture Notes in Networks and Systems (Vol. 97, pp. 777–786). Springer. https://doi.org/10.1007/978-3-030-33506-9_71
Mendeley helps you to discover research relevant for your work.