Vulnerability Assessment on the Secured USB Keyboard

The user authentication on the security applications is one of the most important process. Because character based password is commonly used for user authentication, it is most important to protect the keyboard. Due to the reason, several software solutions for keyboard security have been applied to critical sites. This paper introduces vulnerabilities to the commonly used USB keyboard, implements a sample code using the vulnerabilities and evaluates the possibility for the keyboard data to be stolen in the guarded environment. Through the comparison of the result, a countermeasure to the vulnerabilities is proposed.

[1]  John Clark,et al.  Hardware Trojan Horse Device Based on Unintended USB Channels , 2009, 2009 Third International Conference on Network and System Security.

[2]  Kangbin Yim A New Noise Mingling Approach to Protect the Authentication Password , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[3]  Kyungroul Lee,et al.  Hardware Approach to Solving Password Exposure Problem through Keyboard Sniff , 2009 .

[4]  Kyungroul Lee,et al.  A Solution to Protecting USB Keyboard Data , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[5]  Ilsun You,et al.  Safe Authentication Protocol for Secure USB Memories , 2010, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..