
Deployment of low-level sensor/actor for security analysis
Man in the middle attack on the communication between the USB mouse and a client
Versandkostenfrei!
Versandfertig in 6-10 Tagen
38,99 €
inkl. MwSt.
PAYBACK Punkte
19 °P sammeln!
The USB is specified to be an industry-standardextension to the PC architecture, in my Work, I willcheck the security of USB standards, Iwill build a second test-platform to test and analyzethe USB interface and the USB communication, in theend I will estimate the complexity of extending thetwo platforms in one test-platform. Sensor and actorfor USB interface will be added so that the actoroperates on the USB device which is a black-box. Thesensor intercepts the communication between the actorand the device. The communication will be monitoredvia the host in the Middle, so here the sensor andt...
The USB is specified to be an industry-standard
extension to the PC architecture, in my Work, I will
check the security of USB standards, I
will build a second test-platform to test and analyze
the USB interface and the USB communication, in the
end I will estimate the complexity of extending the
two platforms in one test-platform. Sensor and actor
for USB interface will be added so that the actor
operates on the USB device which is a black-box. The
sensor intercepts the communication between the actor
and the device. The communication will be monitored
via the host in the Middle, so here the sensor and
the actor doesn t satisfy the semantic of sensors
like pressure or temperature sensor which are well
known in the industry, but this scene is simply a
construction of software and hardware known in
cryptography by Man In The Middle attack. This will
yield conclusions for security vulnerability of the
USB- Interface, furthermore case scenarios will be
discussed, amongst other hardware interfaces like
PCI, PCI express and the IEEE 1394.
extension to the PC architecture, in my Work, I will
check the security of USB standards, I
will build a second test-platform to test and analyze
the USB interface and the USB communication, in the
end I will estimate the complexity of extending the
two platforms in one test-platform. Sensor and actor
for USB interface will be added so that the actor
operates on the USB device which is a black-box. The
sensor intercepts the communication between the actor
and the device. The communication will be monitored
via the host in the Middle, so here the sensor and
the actor doesn t satisfy the semantic of sensors
like pressure or temperature sensor which are well
known in the industry, but this scene is simply a
construction of software and hardware known in
cryptography by Man In The Middle attack. This will
yield conclusions for security vulnerability of the
USB- Interface, furthermore case scenarios will be
discussed, amongst other hardware interfaces like
PCI, PCI express and the IEEE 1394.