Malicious, Misbehaving or Misunderstood? Making Bad USBs Good Again


Posted on in Presentations

Deep dive into how the USB protocol works, how it can become an attack vector, why these attacks are effective, and why USB devices can be so difficult to manage. A never-before-seen e-cigarette hack will illustrate how a benign device can be modified into an attack platform, and highlight how different defenses can be more—or less—effective.

Learning Objectives:
1: Gain a thorough understanding of how the USB protocol(s) function.
2: Learn three ways that legitimate USB protocol behavior can be used maliciously.
3: Discover how the same behaviors can be used defensively to porrect against USB threats.

Pre-Requisites:
Knowledge of Windows device management functionality, USB device behavior and Windows driver functionalities will be helpful.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Eric Knapp

Participant

Chief Engineer, Director of Innovation, Honeywell


Share With Your Community