• DocumentCode
    3517596
  • Title

    USB Device Drivers: A Stepping Stone into Your Kernel

  • Author

    Jodeit, Moritz ; Johns, Martin

  • Author_Institution
    n.runs AG, Oberursel, Germany
  • fYear
    2010
  • fDate
    28-29 Oct. 2010
  • Firstpage
    46
  • Lastpage
    52
  • Abstract
    The widely-used Universal Serial Bus (USB) exposes a physical attack vector which has received comparatively little attention in the past. While most research on device driver vulnerabilities concentrated on wireless protocols, we show that USB device drivers provide the same potential for vulnerabilities but offer a larger attack surface resulting from the universal nature of the USB protocol. To demonstrate the effectiveness of fuzzing USB device drivers, we present our prototypical implementation of a mutation-based, man-in-the-middle USB fuzzing framework based on an emulated environment. We practically applied our framework to fuzz the communication between an Apple iPod device and a WindowsXP system. This way, we found several potential vulnerabilities. This supports our claim that the USB architecture exposes real attack vectors and should be considered when assessing the physical security of computer systems in the future.
  • Keywords
    computer architecture; device drivers; peripheral interfaces; protocols; USB device driver; USB fuzzing framework; physical attack vector; universal serial bus; wireless protocol; Computer crashes; Driver circuits; Joining processes; Kernel; Portable media players; Protocols; Universal Serial Bus; buffer overflow; device drivers; fuzzing; memory corruption; usb;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Network Defense (EC2ND), 2010 European Conference on
  • Conference_Location
    Berlin
  • Print_ISBN
    978-1-4244-9377-7
  • Type

    conf

  • DOI
    10.1109/EC2ND.2010.16
  • Filename
    5663316