Reversability Assessment on Secure USB Memories

This paper analyzes authentication and authorization protocols of commercial secure USB memories by reversing the dedicated codes for the protocols. Based on the results of the analysis, the authentication processes are easily bypassed through some modifications on the codes. Authorization processes for USB memories are involved with encryption of data and a key is used for checking authority as well as decrypting the data. Therefore, authorization can be bypassed only if the key is obtained. Through a reversing on the code for authorization, the address information for the key is achieved and used for later authorization process. According to the results, it should be considered in designing the protocols for secure USB memories to improve mutual authentication features and confidentiality of the key for authorization.

[1]  Kyungroul Lee,et al.  A Solution to Protecting USB Keyboard Data , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[2]  Ilsun You,et al.  Safe Authentication Protocol for Secure USB Memories , 2010, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[3]  Matthias Deeg,et al.  Programmed Insecurity – SySS Cracks Yet Another USB Flash Drive , 2011 .