Vulnerability Assessment of Authorization System for USB-Based Storage Devices

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

USB-based storage devices such as flash drives and external hard disks are very popular for data transfer because of their high speed and portability. But they also give rise to information security threats like data loss and spread of malware. In this paper, we present an authorization system to allow only authorized devices to be accessed on a computer for reducing the chances of data loss via USB-based removable storage media. The unique identification of devices is based on device parameters which are part of the USB standard. These parameters have been used for authorizing USB-based storage devices connected to a computer. A vulnerability assessment of the authorization system as well as device authorization parameters has been carried out.

Cite

CITATION STYLE

APA

Kumar, A., Sajeesh, C. S., Vinod Kumar, B., Sharma, V., Joseph, G., & Vinod, G. (2020). Vulnerability Assessment of Authorization System for USB-Based Storage Devices. In Lecture Notes in Mechanical Engineering (pp. 223–237). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-13-9008-1_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free