Yazarlar (3) |
![]() Süleyman Demirel Üniversitesi, Türkiye |
![]() Ahi Evran Üniversitesi, Türkiye |
![]() |
Özet |
The capabilities of protective software such as Antivirus, Firewall, Anti-Malware and Anti-Spyware are increasing day by day in terms of detection and termination of the malwares. Therefore, the use of physical hack tools in cyber-attacks is becoming increasingly common due to their low costs and being readily available. In this study, the main hardware tools used by the cyber attackers to exploit the systems, analyzed deeply. The hardware specifications of these tools, the targeted systems and the types of the attacks are also investigated. Besides, an attack scenario is designed, in which programmable USB devices, commonly used by the hackers, are implemented on the virtual computers. Therefore, an attack attempt which in used programmable USB device, is investigated. The proposed study presents the security measures to be taken against programmable USB device and other hardware security tools. |
Anahtar Kelimeler |
Bluetooth exploitation tools | Hardware keylogger | Programmable USB devices | Wireless network exploitation tools |
Bildiri Türü | Tebliğ/Bildiri |
Bildiri Alt Türü | Tam Metin Olarak Yayımlanan Tebliğ (Uluslararası Kongre/Sempozyum) |
Bildiri Niteliği | Alanında Hakemli Uluslararası Kongre/Sempozyum |
Bildiri Dili | İngilizce |
Kongre Adı | Proceedings of the 7th International Conference on Security of Information and Networks - SIN ’xx14 |
Kongre Tarihi | 09-09-2014 / 11-09-2014 |
Basıldığı Ülke | İskoçya |
Basıldığı Şehir | Glasgow, Scotland, Uk |
Atıf Sayıları | |
Google Scholar | 1 |