A Survey of Malicious HID Devices

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As an interface between human and computers, human interface device is supported by most computer systems. On behalf of user, HID devices can complete many operations including many sensitive operations with high authority. Exploiting this feature, attackers have designed and produced many malicious HID devices, imitating the user’s control. Meanwhile, most systems neglect to consider this security issue, posing great challenges to information security. In this regard, this paper reviews the development of malicious HID devices with analysis of technologies used. According to the technical characteristics, these devices are classified into three categories: Pure HID devices, composite devices with HID interface, malicious devices with wireless communication capabilities. Furthermore, this paper discusses the challenges and opportunities of related research.

Cite

CITATION STYLE

APA

Zhao, S., & Wang, X. A. (2020). A Survey of Malicious HID Devices. In Lecture Notes in Networks and Systems (Vol. 97, pp. 777–786). Springer. https://doi.org/10.1007/978-3-030-33506-9_71

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free