Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: oc-flyfish
Here's the referenced article:

http://tarpit.rmc.ca/leblanc/Research/Clark_Leblanc_Knight-HW_Trojan_Horse_Unintended_USB_Channels.pdf

Bah.

15 posted on 07/06/2010 5:02:59 PM PDT by TChad
[ Post Reply | Private Reply | To 1 | View Replies ]


To: TChad
Thanks for the link.

From the penultimate (and it should have been a lot closer to the front of the paper) page:

3.4.1. Observability. Someone with direct observation of compromise a network endpoint, without attempting access the network endpoint would be able to notice the uploading through the network. of applications, as the text entered by the Hardware Trojan Horse device would appear on the display as text being entered by the keyboard. A user at the network endpoint could also disrupt the uploading of the applications because any characters entered on the legitimate keyboard would be passed to the file containing the uploaded application.

I skimmed the paper, and I believe that a short summary is that a USB keyboard can be programmed to capture keystrokes and also can be setup to automatically type commands that can lead to compromise of data stored the system.

(There's a whole elaborate bit about using audio and keyboard LEDs that I fail to see much use for, but I didn't spend a great deal of time with this paper since the overall attack doesn't seem very covert.)

20 posted on 07/06/2010 6:18:20 PM PDT by snowsislander (In this election year, please ask your candidates if they support repeal of the 1968 GCA.)
[ Post Reply | Private Reply | To 15 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson