Curtain: Keep Your Hosts Away from USB Attacks

6Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent years, many attacks targeting USB were proposed. Besides spreading virus through USB storage, attackers are tending to attack USB stacks because in most cases, any information from devices will be trusted. In this paper, we design a system named Curtain on Windows to defend those attacks by analyzing their IRP flows. Curtain is deployed as a filter driver in USB stack on Windows. It’ll sniff all the IRP flows of each USB device and analyze them. It’s based on the fact that an attack always happens in a short time and that will be reflected in IRP flows. In short, Curtain provides a solution to defend USB attacks on Windows by inserting a filter driver to USB stacks and catch the behaviors of each device.

Author supplied keywords

Cite

CITATION STYLE

APA

Fu, J., Huang, J., & Zhang, L. (2017). Curtain: Keep Your Hosts Away from USB Attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10599 LNCS, pp. 455–471). Springer Verlag. https://doi.org/10.1007/978-3-319-69659-1_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free