2013年4月3日 星期三

Plug and Prey: Malicious USB Devices

http://www.irongeek.com/i.php?page=security/plug-and-prey-malicious-usb-devices#video

Adrian Crenshaw
Presented at Shmoocon 2011
PDF Version

Videos of talks based on this paper
Abstract
            This paper is meant as an overview of malicious USB devices. The paper will first lay out a proposed set of categories for malicious USB devices, how these categories function, how they differ, and how they can be used by an attacker. Next the paper will offer information on how these threats can be technically detected and mitigated, as well as human practices that can help alleviate the threats posed by malicious USB devices.
Sections:

沒有留言:

張貼留言