Leaking Network Devices with Rubber Ducky Attack
Abstract
Keywords
Supporting Institution
Project Number
Thanks
References
- [1] Thomas, T., Piscitelli, M. and Nahar, B.A. (2021). Duck Hunt: Memory forensics of USB attack platforms. DFRWS 2021 Virtual USA Conference.
- [2] Falliere, N., Murchu, L. O. and Chie, E. (2011). W32.Stuxnet Dossier, Symantec Stuxnet Update. Version1.4:1-45.
- [3] Nissim, N., Yahalom, R. and Elovici, Y. (2017). USB-Based attacks. Computers and Security, 70: 675-688.
- [4] Cannoles, B. and Ghafarian, A. (2017). Hacking Experiment Using USB Rubber Ducky Scripting. Proceeding of The 8th Multi-Conference on Complexity (IMCIC), 73-76.
- [5] Chillara, A. K., Saxena, P., Maiti, R. R., Gupta, M., Kondapalli, R., Zhang, Z., & Kesavan, K. (2024). Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards. International Journal of Information Security, 23(3), 2043-2061.
- [6] Kamkar, S. (2024). USB Drive By. https://samy.pl/usbdriveby/ [Accessed: 15 April2024]
- [7] Georgitzikis, V., Akribopoulos, O. and Chatzigiannakis, I. (2012). Controlling Physical Objects via the Internet using the Arduino Platform over 802.15.4 Networks. IEEE Latin America Transactions, 10(3):1686-1689.
- [8] Karystinos, E. and Andreatos A. (2019). Spyduino: Arduino as a HID exploiting the BadUSB Vulnerability. International Conference on Distributed Computing in Sensor Systems (DCOSS), 1-4.
Details
Primary Language
English
Subjects
Operating Systems , Computer Software
Journal Section
Research Article
Authors
Zeynep Rana Dönmez
0009-0009-5232-2136
Türkiye
Şeyma Atmaca
0009-0007-0072-5019
Türkiye
Yıldıray Yalman
*
0000-0002-2313-4525
Türkiye
Early Pub Date
December 11, 2024
Publication Date
December 31, 2024
Submission Date
May 26, 2024
Acceptance Date
June 19, 2024
Published in Issue
Year 1970 Volume: 8 Number: 2
