More than 3000 engineers find our updates useful. You can get them at your mail box!
  
Search your paper presentation and project titles:

Department/Area of interest: ( To list the projects / paper presentations)

Mechanical               Scada technology              Communication             Computer science           Alternative energy
Electrical                  Robotics                        Biometrics                     Artificial intelligence             Electronics

USB: Irresolute Security Barriers


USB are the universal serial bus, used connect many devices to a computer. USBs are smaller and provide a standardized method of connecting various devices to computer for communication. It has effectively replaced the previous interfaces like serial port and parallel port.Let us groupthink about
the presentation entitled "USB: undetermining security barriers" given by Andy Davis from NGS secure. He created "Frisbee" which is used to find the vulnerabilities in USB execution stack operation ,where it is used optimize the speed and size of an application proceeded,and which is also used to discover kernel level vulnerabilities in various operating systems like solaris 8,9,10,11 express,windows 7,window xp, etc. which can be sparked lower down in the USB stack.This inventive advent uses substandard piece of hardware and uniform software with limited physical access to the work.

Basically levitating a device brings out damage to drivers and the attackers take complete control over the targeted destination.The attackers targets defenseless operating systems,where it cannot be extenuated against the data protection software. It is also consider that hackers using this exploit
can install malware and steal sensitive data etc. Inorder to protect against this situation,one needs disable the usb in bios and preclude unauthorized access to the bios. However there is hindmost solution to prevent unauthorized data transfer by filling the usb sockets  or connectors with thick epoxy resins carefully.

Intense Debate Comments