DocumentCode
3517596
Title
USB Device Drivers: A Stepping Stone into Your Kernel
Author
Jodeit, Moritz ; Johns, Martin
Author_Institution
n.runs AG, Oberursel, Germany
fYear
2010
fDate
28-29 Oct. 2010
Firstpage
46
Lastpage
52
Abstract
The widely-used Universal Serial Bus (USB) exposes a physical attack vector which has received comparatively little attention in the past. While most research on device driver vulnerabilities concentrated on wireless protocols, we show that USB device drivers provide the same potential for vulnerabilities but offer a larger attack surface resulting from the universal nature of the USB protocol. To demonstrate the effectiveness of fuzzing USB device drivers, we present our prototypical implementation of a mutation-based, man-in-the-middle USB fuzzing framework based on an emulated environment. We practically applied our framework to fuzz the communication between an Apple iPod device and a WindowsXP system. This way, we found several potential vulnerabilities. This supports our claim that the USB architecture exposes real attack vectors and should be considered when assessing the physical security of computer systems in the future.
Keywords
computer architecture; device drivers; peripheral interfaces; protocols; USB device driver; USB fuzzing framework; physical attack vector; universal serial bus; wireless protocol; Computer crashes; Driver circuits; Joining processes; Kernel; Portable media players; Protocols; Universal Serial Bus; buffer overflow; device drivers; fuzzing; memory corruption; usb;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Network Defense (EC2ND), 2010 European Conference on
Conference_Location
Berlin
Print_ISBN
978-1-4244-9377-7
Type
conf
DOI
10.1109/EC2ND.2010.16
Filename
5663316
Link To Document