{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:16Z","timestamp":1749701656020,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_36","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T10:33:13Z","timestamp":1477045993000},"page":"377-386","source":"Crossref","is-referenced-by-count":1,"title":["Cognitive Countermeasures against BAD USB"],"prefix":"10.1007","author":[{"given":"Yeunsu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hyeji","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kyungroul","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"K. Lee, K. Yim, and E. H. Spafford, Reverse-safe authentication protocol for secure USB memories, Journal of the Security and Communication Networks (SCN), vol. 5, iss. 8, pp. 834-845, Aug. 2012","DOI":"10.1002\/sec.580"},{"key":"36_CR2","unstructured":"K. Lee, H. Yeuk, Y. Choi, S. Pho, I. You, and K. Yim, Safe Authentication Protocol for Secure USB Memories, Journal of the Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), vol.1, num.1, pp. 46-55, Jun. 2010"},{"key":"36_CR3","unstructured":"J. Kim, Y. Lee, K. Lee, T. Jung, D. Volokhov, and K. Yim, Vulnerability to Flash Controller for Secure USB Drives, Journal of the Internet Services and Information Security (IMIS), vol.3, num.3\/4, pp. 136-145, Nov. 2013"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"H. Jeong, Y. Choi, W. Jeon, F. Yang, Y. Lee, S. Kim, and D. Won. Vulnerability analysis of secure usb flash drives. Proceedings of the 2007 IEEE International Workshop on Memory Technology, Design and Testing, (MTDT\u201907), Taipei, Taiwan, pages 61\u201364. IEEE, December 2007","DOI":"10.1109\/MTDT.2007.4547620"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"S. L. Jewan Bang, ByeongYeong Yoo. Secure usb bypassing tool. Journal of the Digital Investigation, 7(Supplement):S114\u2013S120, August 2010","DOI":"10.1016\/j.diin.2010.05.014"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"K. Lee and K. Yim, Keyboard Security: A Technological Review, Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 9-15, Jun. 2011","DOI":"10.1109\/IMIS.2011.148"},{"key":"36_CR7","unstructured":"K. Lee, K. Bae, and K. Yim, Hardware Approach to Solving Password Exposure Problem through Keyboard Sniff, Academic Science Research, WASET, pp. 23-25, Oct. 2009"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"K. Lee, W. Kim, K. Bae, and K. Yim, A Solution to Protecting USB Keyboard Data, Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 108-111, Nov. 2010","DOI":"10.1109\/BWCCA.2010.56"},{"key":"36_CR9","unstructured":"K. Nohl and J. Lell, BadUSB \u2013 on accessories that turn evil, Black Hat USA, Aug. 2014"},{"key":"36_CR10","unstructured":"S. Neuner, Marshall Plan Scholarship Final Report: Security of the Universal Serial Bus, Dec. 2014"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"D. J. Tian, A. Bates, K. Butler, Defending Against Malicious USB Firmware with GoodUSB, Proceedings of the Annual Computer Security Applications Conference (ACSAC), pp. 261-270, 2015","DOI":"10.1145\/2818000.2818040"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"R. Langner, Stuxnet: Disserting a Cyberwarfare weapon, Journal of the IEEE Security & Privacy, vol. 9, iss. 3, pp. 49-51, Jun 2011","DOI":"10.1109\/MSP.2011.67"},{"key":"36_CR13","unstructured":"Microsoft Developer Network, Device and Driver Installation Example, https:\/\/msdn.microsoft.com\/en-us\/library\/ff541158.aspx"},{"key":"36_CR14","unstructured":"Microsoft Hardware Dev Center, IoInvalidateDeviceRelations routine, https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/ff549353(v=vs.85).aspx"},{"key":"36_CR15","unstructured":"Microsoft Hardware Dev Center, DEVICE_OBJECT structure, https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/ff543147(v=vs.85).aspx"},{"key":"36_CR16","unstructured":"Microsoft Hardware Dev Center, DRIVER_OBJECT, https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/ff544174(v=vs.85).aspx"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:05:18Z","timestamp":1749668718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_36","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}