{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:39:36Z","timestamp":1772041176621,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T00:00:00Z","timestamp":1675036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,30]]},"DOI":"10.1145\/3579375.3579390","type":"proceedings-article","created":{"date-parts":[[2023,3,13]],"date-time":"2023-03-13T22:09:58Z","timestamp":1678745398000},"page":"122-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["USB Proxy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5605-8082","authenticated-orcid":false,"given":"Robbie","family":"Dumitru","sequence":"first","affiliation":[{"name":"Defence Science and Technology Group, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9913-2227","authenticated-orcid":false,"given":"Mark","family":"Beaumont","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Group, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7172-6939","authenticated-orcid":false,"given":"Bradley","family":"Hopkins","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Group, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7827-9502","authenticated-orcid":false,"given":"Simon","family":"Windows","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Group, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2009. CVE-2009-4067:.https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2009-4067  2009. CVE-2009-4067:.https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2009-4067"},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Armadillo Hardware Firewall USB 2.0. https:\/\/globotron.nz\/products\/armadillo-hardware-usb-firewall  2022. Armadillo Hardware Firewall USB 2.0. https:\/\/globotron.nz\/products\/armadillo-hardware-usb-firewall"},{"key":"e_1_3_2_1_3_1","unstructured":"2022. Dead Drops. https:\/\/deaddrops.com\/  2022. Dead Drops. https:\/\/deaddrops.com\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2022. eLock USB Lockdown. http:\/\/www.highseclabs.com\/products\/?pid=92  2022. eLock USB Lockdown. http:\/\/www.highseclabs.com\/products\/?pid=92"},{"key":"e_1_3_2_1_5_1","unstructured":"2022. USB Kill. https:\/\/usbkill.com\/  2022. USB Kill. https:\/\/usbkill.com\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2022. USB-Lock-RP. https:\/\/www.usb-lock-rp.com\/  2022. USB-Lock-RP. https:\/\/www.usb-lock-rp.com\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2022. USB Physical Security. https:\/\/www.smartkeeperworld.com\/#\/usb-physicalsecurity  2022. USB Physical Security. https:\/\/www.smartkeeperworld.com\/#\/usb-physicalsecurity"},{"key":"e_1_3_2_1_8_1","unstructured":"2022. USB Port Blocker. https:\/\/www.kensington.com\/p\/products\/data-protection\/usb-port-lock-security\/usb-port-blocker-cable-guard-horizontal\/  2022. USB Port Blocker. https:\/\/www.kensington.com\/p\/products\/data-protection\/usb-port-lock-security\/usb-port-blocker-cable-guard-horizontal\/"},{"key":"e_1_3_2_1_9_1","unstructured":"2022. USB Sentry. https:\/\/www.atcorp.com\/products\/usbsentry\/  2022. USB Sentry. https:\/\/www.atcorp.com\/products\/usbsentry\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2022. USBGuard. https:\/\/usbguard.github.io\/  2022. USBGuard. https:\/\/usbguard.github.io\/"},{"key":"e_1_3_2_1_11_1","unstructured":"2022. USG v1.0 Hardware Firewall. https:\/\/globotron.nz\/products\/usg-v1-0-hardware-usb-firewall  2022. USG v1.0 Hardware Firewall. https:\/\/globotron.nz\/products\/usg-v1-0-hardware-usb-firewall"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium","author":"Angel Sebastian","year":"2016","unstructured":"Sebastian Angel 2016 . Defending against Malicious Peripherals with Cinch . In USENIX Security Symposium 2016. Sebastian Angel 2016. Defending against Malicious Peripherals with Cinch. In USENIX Security Symposium 2016."},{"key":"e_1_3_2_1_13_1","volume-title":"WESS","author":"Bratus Sergey","year":"2012","unstructured":"Sergey Bratus . 2012 . Perimeter-Crossing Buses : a New Attack Surface for Embedded Systems . In WESS 2012. Sergey Bratus. 2012. Perimeter-Crossing Buses : a New Attack Surface for Embedded Systems. In WESS 2012."},{"key":"e_1_3_2_1_14_1","unstructured":"FTDI Chip. 2022. VNC2 - Vinculum-II Programmable USB 2.0 Host. https:\/\/www.ftdichip.com\/old2020\/Products\/ICs\/VNC2.htm  FTDI Chip. 2022. VNC2 - Vinculum-II Programmable USB 2.0 Host. https:\/\/www.ftdichip.com\/old2020\/Products\/ICs\/VNC2.htm"},{"key":"e_1_3_2_1_15_1","volume-title":"Compromise through USB-based Hardware Trojan Horse device. Future Generation Computer Systems 27 (May","author":"Clark John","year":"2011","unstructured":"John Clark , Sylvain Leblanc , and Scott Knight . 2011. Compromise through USB-based Hardware Trojan Horse device. Future Generation Computer Systems 27 (May 2011 ), 555\u2013563. John Clark, Sylvain Leblanc, and Scott Knight. 2011. Compromise through USB-based Hardware Trojan Horse device. Future Generation Computer Systems 27 (May 2011), 555\u2013563."},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium","author":"Dumitru Robert","year":"2023","unstructured":"Robert Dumitru , Daniel Genkin , Andrew Wabnitz , and Yuval Yarom . 2023 . The Impostor Among US(B): Off-Path Injection Attacks on USB Communications . In USENIX Security Symposium 2023. Robert Dumitru, Daniel Genkin, Andrew Wabnitz, and Yuval Yarom. 2023. The Impostor Among US(B): Off-Path Injection Attacks on USB Communications. In USENIX Security Symposium 2023."},{"key":"e_1_3_2_1_17_1","unstructured":"Monta Elkins. 2018. Universal RF USB Keyboard Emulation Device URFUKED. https:\/\/defcon.org\/images\/defcon-18\/dc-18-presentations\/Elkins\/DEFCON-18-Elkins-Universal-RF-Keyboard.pdf  Monta Elkins. 2018. Universal RF USB Keyboard Emulation Device URFUKED. https:\/\/defcon.org\/images\/defcon-18\/dc-18-presentations\/Elkins\/DEFCON-18-Elkins-Universal-RF-Keyboard.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"Travis Goodspeed. 2022. Python USB device emulation. http:\/\/goodfet.sourceforge.net\/hardware\/facedancer21\/  Travis Goodspeed. 2022. Python USB device emulation. http:\/\/goodfet.sourceforge.net\/hardware\/facedancer21\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2019. Found Linux kernel USB bugs. https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/found_bugs_usb.md  Google. 2019. Found Linux kernel USB bugs. https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/found_bugs_usb.md"},{"key":"e_1_3_2_1_20_1","first-page":"5","volume":"52","author":"Halderman Alex","year":"2009","unstructured":"J.\u00a0 Alex Halderman 2009 . Lest We Remember: Cold-Boot Attacks on Encryption Keys. 52 , 5 (May 2009), 91\u201398. https:\/\/doi.org\/10.1145\/1506409.1506429 10.1145\/1506409.1506429 J.\u00a0Alex Halderman 2009. Lest We Remember: Cold-Boot Attacks on Encryption Keys. 52, 5 (May 2009), 91\u201398. https:\/\/doi.org\/10.1145\/1506409.1506429","journal-title":"Lest We Remember: Cold-Boot Attacks on Encryption Keys."},{"key":"e_1_3_2_1_21_1","unstructured":"Samy Kamkar. 2022. USBdriveby. http:\/\/samy.pl\/usbdriveby\/  Samy Kamkar. 2022. USBdriveby. http:\/\/samy.pl\/usbdriveby\/"},{"key":"e_1_3_2_1_22_1","volume-title":"USB man in the middle attacks. Masters Thesis","author":"Kierznowski David","unstructured":"David Kierznowski . 2016. Bad USB 2.0 : USB man in the middle attacks. Masters Thesis . Royal Holloway University of London . David Kierznowski. 2016. BadUSB 2.0: USB man in the middle attacks. Masters Thesis. Royal Holloway University of London."},{"key":"e_1_3_2_1_23_1","unstructured":"Darren Kitchen. 2022. USB Rubber Ducky Payloads. https:\/\/github.com\/hak5\/usbrubberducky-payloads  Darren Kitchen. 2022. USB Rubber Ducky Payloads. https:\/\/github.com\/hak5\/usbrubberducky-payloads"},{"key":"e_1_3_2_1_24_1","volume-title":"Host Identification via USB Fingerprinting. SADFE (05","author":"Letaw Lara","year":"2011","unstructured":"Lara Letaw , Joe Pletcher , and Kevin Butler . 2011. Host Identification via USB Fingerprinting. SADFE (05 2011 ). Lara Letaw, Joe Pletcher, and Kevin Butler. 2011. Host Identification via USB Fingerprinting. SADFE (05 2011)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Hao Liu Riccardo Spolaor Federico Turrin Riccardo Bonafede and Mauro Conti. 2021. USB powered devices: A survey of side-channel threats and countermeasures. High-Confidence Computing(2021).  Hao Liu Riccardo Spolaor Federico Turrin Riccardo Bonafede and Mauro Conti. 2021. USB powered devices: A survey of side-channel threats and countermeasures. High-Confidence Computing(2021).","DOI":"10.1016\/j.hcc.2021.100007"},{"key":"e_1_3_2_1_26_1","volume-title":"Exploring the Taxonomy of USB-Based Attacks. In MLSD","author":"Mamchenko Mark","year":"2019","unstructured":"Mark Mamchenko and Alexey Sabanov . 2019 . Exploring the Taxonomy of USB-Based Attacks. In MLSD 2019. Mark Mamchenko and Alexey Sabanov. 2019. Exploring the Taxonomy of USB-Based Attacks. In MLSD 2019."},{"key":"e_1_3_2_1_27_1","volume-title":"Making Whitelisting-Based Defense Work Against BadUSB. In ICSDE","author":"Mohammadmoradi Hessam","year":"2018","unstructured":"Hessam Mohammadmoradi and Omprakash Gnawali . 2018 . Making Whitelisting-Based Defense Work Against BadUSB. In ICSDE 2018. Hessam Mohammadmoradi and Omprakash Gnawali. 2018. Making Whitelisting-Based Defense Work Against BadUSB. In ICSDE 2018."},{"key":"e_1_3_2_1_28_1","volume-title":"EUROSEC","author":"Neugschwandtner Matthias","year":"2016","unstructured":"Matthias Neugschwandtner , Anton Beitler , and Anil Kurmus . 2016 . A Transparent Defense Against USB Eavesdropping Attacks . In EUROSEC 2016. Matthias Neugschwandtner, Anton Beitler, and Anil Kurmus. 2016. A Transparent Defense Against USB Eavesdropping Attacks. In EUROSEC 2016."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.002"},{"key":"e_1_3_2_1_30_1","first-page":"3","article-title":"Universal serial bus based software attacks and protection solutions","volume":"7","author":"Pham Dung\u00a0Vu","year":"2011","unstructured":"Dung\u00a0Vu Pham , Ali Syed , and Malka\u00a0 N. Halgamuge . 2011 . Universal serial bus based software attacks and protection solutions . Digit. Investig. 7 , 3 \u2013 4 (2011), 172\u2013184. Dung\u00a0Vu Pham, Ali Syed, and Malka\u00a0N. Halgamuge. 2011. Universal serial bus based software attacks and protection solutions. Digit. Investig. 7, 3\u20134 (2011), 172\u2013184.","journal-title":"Digit. Investig."},{"key":"e_1_3_2_1_31_1","volume-title":"USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. In USENIX Security Symposium","author":"Su Yang","year":"2017","unstructured":"Yang Su , Daniel Genkin , Damith\u00a0Chinthana Ranasinghe , and Yuval Yarom . 2017 . USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. In USENIX Security Symposium 2017. Yang Su, Daniel Genkin, Damith\u00a0Chinthana Ranasinghe, and Yuval Yarom. 2017. USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. In USENIX Security Symposium 2017."},{"key":"e_1_3_2_1_32_1","volume-title":"Today - Understanding USB Insecurity in Versions 1 Through C","author":"Tian","year":"2018","unstructured":"Dave\u00a0(Jing) Tian 2018. SoK : \u201c Plug & Pray \u201d Today - Understanding USB Insecurity in Versions 1 Through C . In IEEE Security and Privacy 2018 . Dave\u00a0(Jing) Tian 2018. SoK: \u201cPlug & Pray\u201d Today - Understanding USB Insecurity in Versions 1 Through C. In IEEE Security and Privacy 2018."},{"key":"e_1_3_2_1_33_1","volume-title":"Users really do plug in usb drives they find","author":"Matthew Tischer","year":"2016","unstructured":"Matthew Tischer 2016. Users really do plug in usb drives they find . In IEEE Security and Privacy 2016 . Matthew Tischer 2016. Users really do plug in usb drives they find. In IEEE Security and Privacy 2016."},{"key":"e_1_3_2_1_34_1","unstructured":"USB Implementers Forum. 2014. USB-IF Statement regarding USB security. https:\/\/www.usb.org\/press\/USB-IF_Statement_on_USB_Security_FINAL.pdf.  USB Implementers Forum. 2014. USB-IF Statement regarding USB security. https:\/\/www.usb.org\/press\/USB-IF_Statement_on_USB_Security_FINAL.pdf."}],"event":{"name":"ACSW 2023: 2023 Australasian Computer Science Week","location":"Melbourne VIC Australia","acronym":"ACSW 2023"},"container-title":["2023 Australasian Computer Science Week"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579375.3579390","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579375.3579390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:41Z","timestamp":1750178801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579375.3579390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,30]]},"references-count":34,"alternative-id":["10.1145\/3579375.3579390","10.1145\/3579375"],"URL":"https:\/\/doi.org\/10.1145\/3579375.3579390","relation":{},"subject":[],"published":{"date-parts":[[2023,1,30]]},"assertion":[{"value":"2023-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}