scholarly journals Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices

2021 ◽  
Vol 10 (1) ◽  
pp. 19
Author(s):  
José Oliveira ◽  
Pedro Pinto ◽  
Henrique Santos

Cyberattacks exploiting Universal Serial Bus (USB) interfaces may have a high impact on individual and corporate systems. The BadUSB is an attack where a USB device’s firmware is spoofed and, once mounted, allows attackers to execute a set of malicious actions in a target system. The countermeasures against this type of attack can be grouped into two strategies: phyiscal blocking of USB ports and software blocking. This paper proposes a distributed architecture that uses software blocking to enhance system protection against BadUSB attacks. This architecture is composed of multiple agents and external databases, and it is designed for personal or corporate computers using Microsoft Windows Operating System. When a USB device is connected, the agent inspects the device, provides filtered information about its functionality and presents a threat assessment to the user, based on all previous user choices stored in external databases. By providing valuable information to the user, and also threat assessments from multiple users, the proposed distributed architecture improves system protection.

2020 ◽  
Vol 2 (2) ◽  
Author(s):  

This article has been produced by the Combined Threat Assessment Group (CTAG). It provides in detail, and publicly for the first time, a genuinely informed explanation for the origins and function of CTAG. It covers the nature and challenge of threat assessment, the methodology applied as well various iterations of the threat assessments that are undertaken. This leads on to an explanation of how New Zealand’s National Terrorism Threat Level is set. Overall, this article provides an informative and well-rounded explanation of the components that comprise the National Terrorism Threat Level and makes for essential reading for wider public service, academic, and security conscious public and private institutions across the country.


Author(s):  
Yongzheng Wu ◽  
Roland H.C. Yap ◽  
Rajiv Ramnath ◽  
Felix Halim

Malware causes damage by stealing confidential data or making other software unusable. Ensuring software trustworthiness is difficult because malware may disguise itself to appear benign or trusted. This chapter explores the problem of making software more trustworthy through the use of binary integrity mechanisms. The authors review the problem of devising an effective binary integrity protection, and discuss how it complements other operating system security measures. They analyze design factors for binary integrity and compare existing systems. The authors then present a prototype which exemplifies a mandatory binary integrity mechanism and its integration within an operating system. Their system, BinAuth, demonstrates a practical, lightweight in-kernel binary authentication system for Microsoft Windows. A system like BinAuth shows that mandatory authentication is practical on complex commodity operating system like Windows. To deal with various constraints in the user’s environments, BinAuth uses a flexible scheme which does not mandate public key infrastructure (PKI) although it can take advantage of it. The authors also combine the authentication with a simple software-ID scheme which is useful for software management and vulnerability assessment.


Author(s):  
Craig M. Howard

The overall size of software packages has grown considerably over recent years. Modular programming, object-oriented design and the use of static and dynamic libraries have all contributed towards the reusability and maintainability of these packages. One of the latest methodologies that aims to further improve software design is the use of component-based services. The Component Object Model (COM) is a specification that provides a standard for writing software components that are easily interoperable. The most common platform for component libraries is on Microsoft Windows, where COM objects are an integral part of the operating system and used extensively in most major applications. This chapter examines the use of COM in the design of search engines for knowledge discovery and data mining using modern heuristic techniques and how adopting this approach benefits the design of a commercial toolkit. The chapter describes how search engines have been implemented as COM objects and how representation and problem components have been created to solve rule induction problems in data mining.


Author(s):  
Julie R. Mariga

This chapter introduces the enormous impact of mobile computing on both companies and individuals. Companies face many issues related to mobile computing. For example: which devices will be supported by the organization? which devices will fulfill the business objectives? which form factor will win? which features and networks will future devices offer? which operating systems will they run? what will all this cost? what are the security issues involved? what are the business drivers? This chapter will discuss the major business drivers in the mobile computing field, and provide an analysis of the top two operating systems that are currently running the majority of mobile devices. These platforms are the 1) Palm operating system (OS), and 2) Microsoft Windows CE operating system. The chapter will analyze the strengths and weaknesses of each operating system and discuss market share and future growth.


2019 ◽  
Vol 10 (1) ◽  
pp. 1251-1257
Author(s):  
Abhinandan H Patil

Evolving multi-parameter, multi-configuration systems require regression test suite that can be customized. This is in terms of run time. Run time can be customized by generating the combinations using combinatorial techniques. For systems like Contiki operating system, the test cases need to be executed in its simulator Cooja. Executing test cases in a simulator requires functional test cases to be generated from the combinatorial parameter combinations obtained. In this work we present a methodology to generate the functional test cases. We present Functional Test Case Generator for Contiki and Cooja (FTCGCC), which is a tool developed using our methodology. We demonstrate use of our tool by generating customizable regression test suite for Contiki and Cooja using code coverage as criteria. FTCGCC is developed for the test case generation when target System Under Test is IoT operating system Contiki and its simulator Cooja.


2012 ◽  
Vol 20 (2) ◽  
pp. 24-27 ◽  
Author(s):  
Robert Hovden

Gatan Digital Micrograph (DM) software is considered an industry standard among microscopists. The offline DM application is freely available from Gatan. Unfortunately, DM software has been designed to run only on Microsoft Windows operating systems, thus distancing the microscopy community from popular Unix-based systems, such as Linux or Mac OSX. An ad hoc solution to this problem has required a virtualized Windows operating system running on top of the user's native operating system. This is not only slow, having to emulate each processor instruction, but also requires installation and licensing of Windows and the virtualization software. However, with the aid of open-source resources, it is possible to run DM natively on Linux and Mac OSX (Figure 1). This article was written as a guide with easy-to-follow installation instructions to liberate users from the Windows emulation pidgeonhole and enable them to freely analyze data on Unix-based systems.


Author(s):  
Adi Farshteindiker ◽  
Rami Puzis

With the advent of microservice-based software architectures, an increasing number of modern cloud environments and enterprises use operating system level virtualization, often referred to as containers. Docker Swarm is one of the most popular container orchestration infrastructures, providing high availability and fault tolerance. Occasionally discovered container escape vulnerabilities allow adversaries to execute code on the host operating system and operate within the cloud infrastructure. We show that docker swarm is currently not secured against misbehaving manager nodes and allows a high impact, high probability privilege escalation attack that we refer to as leadership hijacking. Cloud lateral movement and defense evasion payloads allow an adversary to leverage the docker swarm functionality to control each and every host in the underlying cluster. We demonstrate an end-to-end attack, in which an adversary with access to an application running on the cluster achieves full control of the cluster. To reduce the probability of a successful high impact attack, container orchestration infrastructures must reduce the trust level of participating nodes and in particular, incorporate adversary immune leader election algorithms.


Sign in / Sign up

Export Citation Format

Share Document