Title :
USB Device Drivers: A Stepping Stone into Your Kernel
Author :
Jodeit, Moritz ; Johns, Martin
Author_Institution :
n.runs AG, Oberursel, Germany
Abstract :
The widely-used Universal Serial Bus (USB) exposes a physical attack vector which has received comparatively little attention in the past. While most research on device driver vulnerabilities concentrated on wireless protocols, we show that USB device drivers provide the same potential for vulnerabilities but offer a larger attack surface resulting from the universal nature of the USB protocol. To demonstrate the effectiveness of fuzzing USB device drivers, we present our prototypical implementation of a mutation-based, man-in-the-middle USB fuzzing framework based on an emulated environment. We practically applied our framework to fuzz the communication between an Apple iPod device and a WindowsXP system. This way, we found several potential vulnerabilities. This supports our claim that the USB architecture exposes real attack vectors and should be considered when assessing the physical security of computer systems in the future.
Keywords :
computer architecture; device drivers; peripheral interfaces; protocols; USB device driver; USB fuzzing framework; physical attack vector; universal serial bus; wireless protocol; Computer crashes; Driver circuits; Joining processes; Kernel; Portable media players; Protocols; Universal Serial Bus; buffer overflow; device drivers; fuzzing; memory corruption; usb;
Conference_Titel :
Computer Network Defense (EC2ND), 2010 European Conference on
Conference_Location :
Berlin
Print_ISBN :
978-1-4244-9377-7
DOI :
10.1109/EC2ND.2010.16