Seven deadliest USB attacks, 2010. ,
Defending against malicious peripherals with Cinch, USENIX Security Symposium, 2016. ,
Anonymity loves company: Usability and the network effect, Workshop on the Economics of Information Security, 2006. ,
When security meets usability: A user-centric approach on a crossroads priority problem, 14th Panhellenic Conference on Informatics (PCI 2010) (2010), 2010. ,
DOI : 10.1109/pci.2010.17
USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction, Privacy, Security and Trust (PST), 2016 14th Annual Conference on, pp.493-496, 2016. ,
DOI : 10.1109/pst.2016.7907004
GSMem: Data exfiltration from air-gapped computers over GSM frequencies, 24th USENIX Security Symposium (USENIX Security 15), pp.849-864, 2015. ,
IRON-HID: Create your own bad USB (white paper). HITBSecConf 2016-Amsterdam, The 7th Annual HITB Security Conference in the Netherlands, 2016. ,
Protecting against malicious bits on the wire: Automatically generating a USB protocol parser for a production kernel, Proceedings of the 33rd Annual Computer Security Applications Conference, pp.528-541, 2017. ,
USBWall: A Novel Security Mechanism to Protect Against Maliciously Reprogrammed USB Devices. Master's thesis, 2015. ,
DOI : 10.1080/19393555.2017.1329461
URL : https://kuscholarworks.ku.edu/bitstream/1808/19390/1/Kang_ku_0099M_14318_DATA_1.pdf
Stuxnet: Dissecting a cyberwarfare weapon, Security & Privacy, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/msp.2011.67
Sandusb: An installation-free sandbox for usb peripherals, Internet of Things (WF-IoT), pp.621-626, 2016. ,
DOI : 10.1109/wf-iot.2016.7845512
A Transparent Defense Against USB Eavesdropping Attacks, Proceedings of the 9th European Workshop on System Security, vol.6, pp.1-6, 2016. ,
DOI : 10.1145/2905760.2905765
USB-based attacks, Computers & Security, vol.70, pp.675-688, 2017. ,
DOI : 10.1016/j.cose.2017.08.002
Universal serial bus based software attacks and protection solutions, Digital Investigation, vol.7, issue.3, pp.172-184, 2011. ,
DOI : 10.1016/j.diin.2011.02.001
A survey of keystroke dynamics biometrics, The Scientific World Journal, 2013. ,
DOI : 10.1155/2013/408280
URL : http://downloads.hindawi.com/journals/tswj/2013/408280.pdf
Defending Against Malicious USB Firmware with GoodUSB, Proceedings of the 31st Annual Computer Security Applications Conference, pp.261-270, 2015. ,
DOI : 10.1145/2818000.2818040
ProvUSB: Block-level provenance-based data protection for USB storage devices, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), pp.242-253, 2016. ,
Making USB great again with USBFILTER, 25th USENIX Security Symposium (USENIX Security 16), pp.415-430, 2016. ,
Users Really Do Plug in USB Drives They Find, Security and Privacy (SP), 2016. ,
DOI : 10.1109/sp.2016.26
Identity verification through keyboard characteristics, International journal of man-machine studies, vol.23, issue.3, pp.263-273, 1985. ,
DOI : 10.1016/s0020-7373(85)80036-5
Exploiting smart-phone USB connectivity for fun and profit, Proceedings of the 26th Annual Computer Security Applications Conference, pp.357-366, 2010. ,
DOI : 10.1145/1920261.1920314
URL : http://cs.gmu.edu/%7Eastavrou/research/acsac10.pdf
TMSUI: A trust management scheme of USB storage devices for industrial control systems, Information and Communications Security: 17th International Conference, ICICS 2015, pp.152-168, 2015. ,
The usbmon: USB monitoring framework, Linux Symposium, p.291, 2005. ,