[1] Clark J, Leblanc S, Knight S.Compromise through USB-based Hardware Trojan Horse device[J]. Future Generation Computer Systems(S0167-739X), 2011, 27(5): 555-563 [2] Butler K R B, McLaughlin S E, McDaniel P D. Kells: a protection framework for portable data[C]// Proceedings of the 26th Annual Computer Security Applications Conference. USA: ACM, 2010: 231-240. [3] 夏天河. 基于WDM过滤驱动的USB访问控制系统的研究与实现 [D]. 重庆: 重庆大学, 2012. [4] Yang F, Wu T, Chiu S, et al.A secure control protocol for USB mass storage devices[J]. IEEE Transactions on Consumer Electronics (S0098-3063), 2010, 56(4): 2239-2343. [5] S K Karsten Nohl, J Lell. BadUSB-On accessories that turn evil [Z/OL].(2014-07-15) [2015-04-30]. https://srlabs.de/blog/wp-content/uploads/2014/07/SRLabs-BadUSB-BlackHat-v1.pdf. 2014. [6] Barral D Dewey. Plug and root, The USB Key to the Kingdom [Z/OL]. (2005-07-27) [2015-04-30]. http://www.blackhat.com/presentations/bh-usa-05/BH_US_05-Barrall-Dewey.pdf. 2005. [7] Wang A, Li Z, Yang X, et al.A New Security Problem of USB: Monitoring Cable Attack and Countermeasures[C]// Proceedings of the 2012 International Conference on Information Technology and Software Engineering. Heidelberg,Germany: Springer Berlin, 2012: 129-137. [8] Jodeit M, Johns M.USB Device Drivers: A Stepping Stone into your Kernel[C]// Computer Network Defense (EC2ND), 2010 European Conference on. Los Alamitos: IEEE, 2010: 46-52. [9] Schumilo S, Spenneberg R.Don’t trust your USB! How to find bugs in USB device drivers [Z/OL].(2014-09-28) [2015-04-30].https://www.blackhat.com/docs/eu-14/materials/eu-14-Schumilo-Dont-Trust-Your-USB-How-To-Find-Bugs-In-USB-Device-Drivers-wp.pdf. 2014. [10] 杨先文, 李峥, 王安, 等. 密码安全USB设备控制器IP的系统设计[J]. 华中科技大学学报, 2010, 38(9): 59-62. [11] 李翠. 安全USB设备控制器设计与实现 [D]. 郑州: 解放军信息工程大学, 2013. |