• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Vulnerability Assessment on the Secured USB Keyboard


Kyung-Roul Lee, Kang-Bin Yim, Journal of Internet Computing and Services, Vol. 12, No. 5, pp. 39-46, Oct. 2011
Full Text:
Keywords: USB keyboard, Vulnerability Assessment, secure keyboard software, keyboard sniffing, password authentication

Abstract

The user authentication on the security applications is one of the most important process. Because character based password is commonly used for user authentication, it is most important to protect the keyboard. Due to the reason, several software solutions for keyboard security have been applied to critical sites. This paper introduces vulnerabilities to the commonly used USB keyboard, implements a sample code using the vulnerabilities and evaluates the possibility for the keyboard data to be stolen in the guarded environment. Through the comparison of the result, a countermeasure to the vulnerabilities is proposed.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Kyung-Roul Lee and Kang-Bin Yim (2011). Vulnerability Assessment on the Secured USB Keyboard. Journal of Internet Computing and Services, 12(5), 39-46.

[IEEE Style]
K. Lee and K. Yim, "Vulnerability Assessment on the Secured USB Keyboard," Journal of Internet Computing and Services, vol. 12, no. 5, pp. 39-46, 2011.

[ACM Style]
Kyung-Roul Lee and Kang-Bin Yim. 2011. Vulnerability Assessment on the Secured USB Keyboard. Journal of Internet Computing and Services, 12, 5, (2011), 39-46.