{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:16:16Z","timestamp":1771611376705,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030335052","type":"print"},{"value":"9783030335069","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T00:00:00Z","timestamp":1571356800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33506-9_71","type":"book-chapter","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T22:15:43Z","timestamp":1571350543000},"page":"777-786","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Survey of Malicious HID Devices"],"prefix":"10.1007","author":[{"given":"Songyin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,18]]},"reference":[{"key":"71_CR1","first-page":"9","volume":"1","author":"K Nohl","year":"2014","unstructured":"Nohl, K., Lell, J.: BadUSB-on accessories that turn evil. Black Hat USA 1, 9 (2014)","journal-title":"Black Hat USA"},{"key":"71_CR2","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.cose.2017.08.002","volume":"70","author":"N Nissim","year":"2017","unstructured":"Nissim, N., Yahalom, R., Elovici, Y.: USB-based attacks. Comput. Secur. 70, 675\u2013688 (2017)","journal-title":"Comput. Secur."},{"key":"71_CR3","unstructured":"Human_interface_device-wikipedia. \n                    https:\/\/en.wikipedia.org\/wiki\/Human_interface_device"},{"issue":"5","key":"71_CR4","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.future.2010.04.008","volume":"27","author":"J Clark","year":"2011","unstructured":"Clark, J., Leblanc, S., Knight, S.: Compromise through USB-based hardware trojan horse device. Future Gener. Comput. Syst. 27(5), 555\u2013563 (2011)","journal-title":"Future Gener. Comput. Syst."},{"key":"71_CR5","unstructured":"Universal Serial Bus Specification Reversion 2.0 (2000). \n                    http:\/\/www.usb.org"},{"key":"71_CR6","unstructured":"Programmable HID USB keystroke dongle: using the teensy as a pen testing device. \n                    http:\/\/www.irongeek.com\/i.php?page=security\/programmable-hid-usb-keystroke-dongle"},{"key":"71_CR7","unstructured":"USB Rubber Ducky - Hak5. \n                    https:\/\/shop.hak5.org\/products\/usb-rubber-ducky-deluxe"},{"key":"71_CR8","unstructured":"Teensy USB Development Board \u2013 PJRC. \n                    https:\/\/www.pjrc.com\/teensy\/"},{"key":"71_CR9","unstructured":"Pisani, J., Carugati, P., Rushing, R.: USB-HID hacker interface design. BlackHat Briefings, July 2010"},{"key":"71_CR10","unstructured":"Social-Engineer Toolkit v0.6.1 Teensy USB HID Attack Vector \u2013 TrustedSec. \n                    https:\/\/www.trustedsec.com\/2010\/08\/social-engineer-toolkit-v0-6-1-teensy-usb-hid-attack-vector\/"},{"key":"71_CR11","unstructured":"Kautilya: Teensy beyond shells. \n                    https:\/\/media.blackhat.com\/bh-ad-11\/Mittal\/bh-ad-11-Mittal-Kautilya_Teensy_Beyond_Shell-WP.pdf"},{"key":"71_CR12","doi-asserted-by":"crossref","unstructured":"Tzokatziou, G., Maglaras, L.A., Janicke, H., He, Y.: Exploiting SCADA vulnerabilities using a human interface device. Int. J. Adv. Comput. Sci. Appl. 234\u2013241 (2015)","DOI":"10.14569\/IJACSA.2015.060731"},{"key":"71_CR13","unstructured":"Kamkar, S.: USBdriveby: exploiting USB in style. \n                    http:\/\/samy.pl\/usbdriveby\/"},{"key":"71_CR14","unstructured":"EvilDuino \u2013 SlideShare. \n                    https:\/\/www.slideshare.net\/Rashidferoz1\/evilduino"},{"key":"71_CR15","unstructured":"Digispark USB Development Board \u2013 Digistump. \n                    http:\/\/digistump.com\/products\/1"},{"key":"71_CR16","unstructured":"A smaller, cost-reduced digispark (<$1) \u2013 Digistump. \n                    https:\/\/digistump.com\/board\/index.php?topic=1025.0"},{"key":"71_CR17","unstructured":"GitHub - mame82\/duck2spark. \n                    https:\/\/github.com\/mame82\/duck2spark"},{"key":"71_CR18","unstructured":"HIDden gem: Low-cost Digispark USB now quacks DuckyScript | Nixu Cybersecurity. \n                    https:\/\/www.nixu.com\/blog\/hidden-gem-low-cost-digispark-usb-now-quacks-duckyscript"},{"key":"71_CR19","doi-asserted-by":"crossref","unstructured":"Clark, J., Leblanc, S., Knight, S.: Risks associated with USB hardware trojan devices used by insiders. In: 2011 IEEE International Systems Conference, pp. 201\u2013208. IEEE (2011)","DOI":"10.1109\/SYSCON.2011.5929130"},{"key":"71_CR20","unstructured":"Maskiewicz, J., Ellis, B., Mouradian, J., Shacham, H.: Mouse trap: exploiting firmware updates in USB peripherals. In: 8th USENIX Workshop on Offensive Technologies WOOT 2014 (2014)"},{"key":"71_CR21","unstructured":"Bash Bunny - Hak5. \n                    https:\/\/shop.hak5.org\/products\/bash-bunny"},{"key":"71_CR22","unstructured":"Elkins, M.: Hacking with hardware: introducing the universal RF USB keyboard emulation device: URFUKED (2010)"},{"key":"71_CR23","unstructured":"NSA Playset: USB Tools [ShmooCon 2015]. \n                    https:\/\/www.youtube.com\/watch?v=uDPxa5tcdnI"},{"key":"71_CR24","unstructured":"NSA Ant Catalog \u2013 USB. \n                    https:\/\/nsa.gov1.info\/dni\/nsa-ant-catalog\/usb\/index.html"},{"key":"71_CR25","unstructured":"DEFCON 2019. \n                    https:\/\/mg.lol\/blog\/defcon-2019\/"},{"key":"71_CR26","unstructured":"USBHarpoon a look-like charging cable that can hack into your computer Security Affairs. \n                    https:\/\/securityaffairs.co\/wordpress\/75644\/hacking\/usbharpoon-attack.html"},{"key":"71_CR27","unstructured":"GitHub - whid-injector. \n                    https:\/\/github.com\/whid-injector\/WHID"},{"key":"71_CR28","unstructured":"GitHub - mame82\/P4wnP1. \n                    https:\/\/github.com\/mame82\/P4wnP1"},{"key":"71_CR29","unstructured":"GitHub - mame82\/P4wnP1_aloa. \n                    https:\/\/github.com\/mame82\/P4wnP1_aloa"},{"key":"71_CR30","unstructured":"Mousejack Technical Details \u2014 Bastille. \n                    http:\/\/www.bastille.net\/research\/vulnerabilities\/mousejack\/technical-details"}],"container-title":["Lecture Notes in Networks and Systems","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33506-9_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T22:23:19Z","timestamp":1571350999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33506-9_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,18]]},"ISBN":["9783030335052","9783030335069"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33506-9_71","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,18]]},"assertion":[{"value":"18 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antwerp","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/bwcca\/2019\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}