| 研究生: |
許祐瑋 Yu-Wei Hsu |
|---|---|
| 論文名稱: | HERMES:A Light Weight Method to Simulate a USB Device or Pass a USB Firewall |
| 指導教授: |
許富皓
Fu-Hau Hsu |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系在職專班 Executive Master of Computer Science & Information Engineering |
| 論文出版年: | 2019 |
| 畢業學年度: | 107 |
| 語文別: | 中文 |
| 論文頁數: | 47 |
| 中文關鍵詞: | USB攻擊 、USB防火牆 |
| 外文關鍵詞: | BadUSB, Human Interface Device |
| 相關次數: | 點閱:15 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
USB 介面已經存在多數電腦硬體平台上,然而大部份認定 USB 裝置的威脅只存 在於 USB 隨身碟上,BadUSB 是一種硬體裝置,通過 USB 介面孔,插入目標電腦或其 他裝置,模擬成 HID 介面,進行執行攻擊程式碼或干擾,達到控制主機和資訊洩漏, 目前阻擋 BadUSB 攻擊的方法,以黑白名單防火牆較為常見,利用 USB 的功能特徵和 訊息進行判別,以達到阻擋效果。
目前存在低成本單晶片 BadUSB 的平台,如 Rubber ducky , Teensy USB 和 Arduino 等等,無法同時模擬儲存裝置和鍵盤,同時也無法把 USB 的資訊個做更底層 的偽冒,讓 USB firewall 可以利用此特點做攔截。因此在本篇論文中我們將發展出可 以穿透目前 USB firewall 的 BadUSB,此 BadUSB 可以做更低階偽冒,模擬同一個 USB 裝置同時存在多個 USB 功能,並使用認證機制來檢驗 HID 攻擊。
The USB interface already exists on most computer hardware platforms. However, most of the threats of the USB devices are only found on USB flash devices. BadUSB is a hardware device that plugs into a target computer or other device through a USB interface and simulates HID. The interface, to execute the attack code or interference, to achieve control host and information leakage, currently blocking the BadUSB attack method, black and white list firewall is more common, using USB features and messages to determine the blocking effect.
There are currently low-cost single-chip BadUSB platforms, such as Rubber ducky, Teensy USB and Arduino, etc., it cannot simulate simultaneous simulation of USB information, so that USB firewall can use this features to do interception. Therefore, in this paper, we will develop BadUSB that can pass current USB firewalls, This BadUSB can do lower-level faking, simulate multiple USB functions at the same time with the same USB device, and use the authentication mechanism to verify HID attacks.
[1] Dave (Jing) Tian, Nolen Scaif, Kevin R. B. Butler, Patrick Traynor, “Making USB Great Again with USBFILTER”, USENIX Security Symposium, 2016
https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_p aper_tian.pdf
[2] Karsten Nohl, Sascha KriBler, Jakob Lell, “BadUSB- On accessories that turn evil”
https://srlabs.de/wp-content/uploads/2014/11/SRLabs-BadUSB-Pacsec- v2.pdf
[3] Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin Butler, “FirmUSB Vetting USB Device Firmware using Domain Informed Symbolic Execution”, ACM CCS’17, November, 2017, https://arxiv.org/pdf/1708.09114.pdf
[4] USBGuard[Online]. Available
https://usbguard.github.io/
[5] Rubber Ducky[Online]. Available
https://shop.hak5.org/products/usb-rubber-ducky-deluxe
[6] P4wnP1 [Online]. Available
https://github.com/mame82/P4wnP1
[7] 深入淺出 Raspberry Pi GPIO[Online]. Available https://www.slideshare.net/raspberrypi-tw/raspberry-pigpiolookinside
[8] USB 維基百科[Online]. Available https://zh.wikipedia.org/wiki/USB
[9] Joathan Corbet, Alessandro Rubini, GregKroah-Hartman, “Linux Device Drivers, 3e”
http://www2.electron.frba.utn.edu.ar/~gjoyuela/archivos/linux/ldd3.pdf
[10] Psychson [Online]. Available:
https://github.com/brandonlw/Psychson