{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T10:10:19Z","timestamp":1766139019850,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3700871","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"94-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Transformer-based GAN-augmented Defender for Adversarial USB Keystroke Injection Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8386-0041","authenticated-orcid":false,"given":"Anil Kumar","family":"Chillara","sequence":"first","affiliation":[{"name":"Birla Institute of Technology and Sciences, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7426-1292","authenticated-orcid":false,"given":"Paresh","family":"Saxena","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology and Sciences, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5510-8217","authenticated-orcid":false,"given":"Rajib Ranjan","family":"Maiti","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology and Sciences, Hyderabad, Telangana, India"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34166-3_46"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.21125\/inted.2017.1008"},{"key":"e_1_3_3_1_4_2","unstructured":"Robert Britt and Michael Black. 2019. Detecting phishing websites using natural language processing and machine learning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1909.07751 (2019)."},{"key":"e_1_3_3_1_5_2","volume-title":"The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)","author":"Cappelli Dawn\u00a0M","year":"2012","unstructured":"Dawn\u00a0M Cappelli, Andrew\u00a0P Moore, and Randall\u00a0F Trzeciak. 2012. The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Jian Chen Xuxin Zhang Rui Zhang Chen Wang and Ling Liu. 2021. De-pois: An attack-agnostic defense against data poisoning attacks. IEEE Transactions on Information Forensics and Security 16 (2021) 3412\u20133425.","DOI":"10.1109\/TIFS.2021.3080522"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00113"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Anil\u00a0Kumar Chillara Paresh Saxena Rajib\u00a0Ranjan Maiti Manik Gupta Raghu Kondapalli Zhichao Zhang and Krishnakumar Kesavan. 2024. Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards. International Journal of Information Security 23 3 (2024) 2043\u20132061.","DOI":"10.1007\/s10207-024-00834-y"},{"key":"e_1_3_3_1_9_2","unstructured":"CORO. 2024. Why USB Attacks Are Back and How to Prevent Them. Retrieved July 17 2024 from https:\/\/www.coro.net\/blog\/why-usb-attacks-are-back-and-how-to-prevent-them"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Kyle Denney Leonardo Babun and A\u00a0Selcuk Uluagac. 2020. USB-watch: A generalized hardware-assisted insider threat detection framework. Journal of Hardware and Systems Security 4 (2020) 136\u2013149.","DOI":"10.1007\/s41635-020-00092-z"},{"key":"e_1_3_3_1_11_2","unstructured":"Jacob Devlin. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1810.04805 (2018)."},{"key":"e_1_3_3_1_12_2","unstructured":"Jacob Devlin Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805 (2018). arXiv:https:\/\/arXiv.org\/abs\/1810.04805http:\/\/arxiv.org\/abs\/1810.04805"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Aeryn Dunmore Julian Jang-Jaccard Fariza Sabrina and Jin Kwak. 2023. A comprehensive survey of generative adversarial networks (GANs) in cybersecurity intrusion detection. IEEE Access (2023).","DOI":"10.1109\/ACCESS.2023.3296707"},{"key":"e_1_3_3_1_14_2","unstructured":"Crist\u00f3bal Esteban Stephanie\u00a0L Hyland and Gunnar R\u00e4tsch. 2017. Real-valued (medical) time series generation with recurrent conditional gans. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1706.02633 (2017)."},{"key":"e_1_3_3_1_15_2","unstructured":"PVDS Eswar. 2021. Microcontroller manipulated as human interface device performing keystroke injection attack. Int. Res. J. Mod. Eng. Technol. Sci 3 (2021) 1230\u20131233."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Xin Gao Fang Deng and Xianghu Yue. 2020. Data augmentation in fault diagnosis based on the Wasserstein generative adversarial network with gradient penalty. Neurocomputing 396 (2020) 487\u2013494.","DOI":"10.1016\/j.neucom.2018.10.109"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2020. Generative adversarial networks. Commun. ACM 63 11 (2020) 139\u2013144.","DOI":"10.1145\/3422622"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.2172\/1000159"},{"key":"e_1_3_3_1_19_2","unstructured":"Ehsan Hashemi Nhien-An Le-Khac and Tahar Kechadi. 2020. Real-time threat intelligence using machine learning-based approaches. Computers & Security 90 (2020) 101705."},{"key":"e_1_3_3_1_20_2","unstructured":"Honeywell. 2024. Cybersecurity in 2024: USB Devices Continue to Pose Major Threat. Retrieved July 17 2024 from https:\/\/www.honeywell.com\/us\/en\/news\/2024\/04\/cybersecurity-in-2024-usb-devices-continue-to-pose-major-threat"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412399"},{"key":"e_1_3_3_1_23_2","first-page":"89","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)","author":"Kharraz Amin","year":"2019","unstructured":"Amin Kharraz, Brandon\u00a0L Daley, Graham\u00a0Z Baker, William Robertson, and Engin Kirda. 2019. { USBESAFE} : An { End-Point} Solution to Protect Against { USB-Based} Attacks. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). 89\u2013103."},{"key":"e_1_3_3_1_24_2","unstructured":"Youngsoo Kim and Jihun Kwon. 2022. Malware detection using deep learning algorithms. Journal of Computer Virology and Hacking Techniques 18 2 (2022) 129\u2013140."},{"key":"e_1_3_3_1_25_2","first-page":"4461","volume-title":"Advances in Neural Information Processing Systems","author":"Lu Kaiji","year":"2021","unstructured":"Kaiji Lu, Zifan Wang, Piotr Mardziel, and Anupam Datta. 2021. Influence Patterns for Explaining Information Flow in BERT. In Advances in Neural Information Processing Systems , M.\u00a0Ranzato, A.\u00a0Beygelzimer, Y.\u00a0Dauphin, P.S. Liang, and J.\u00a0Wortman Vaughan (Eds.), Vol.\u00a034. Curran Associates, Inc., 4461\u20134474. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2021\/file\/239f914f30ea3c948fce2ea07a9efb33-Paper.pdf"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339268"},{"key":"e_1_3_3_1_27_2","unstructured":"NateNelson. 2024. The Weirdest Trend in Cybersecurity\u2019: Nation-States Returning to USBs. Retrieved July 17 2024 from https:\/\/www.darkreading.com\/ics-ot-security\/weirdest-trend-cybersecurity-nation-states-usb"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN52536.2021.9566083"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-6_18"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Nir Nissim Ran Yahalom and Yuval Elovici. 2017. USB-based attacks. Computers & Security 70 (2017) 675\u2013688.","DOI":"10.1016\/j.cose.2017.08.002"},{"key":"e_1_3_3_1_31_2","unstructured":"Insight Partners. 2023. The Insight Partners Device marketsize and share Dec 2021 [Online]. Retrieved July 17 2024 from https:\/\/www.theinsightpartners.com\/reports\/usb-device-market"},{"key":"e_1_3_3_1_32_2","unstructured":"Andrea Paudice Luis Munoz-Gonzalez and Emil\u00a0C Lupu. 2018. Detection of adversarial training examples in poisoning attacks through anomaly detection. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1802.03041 (2018)."},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/IC2IE50715.2020.9274631"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Ishai Rosenberg Asaf Shabtai Yuval Elovici and Lior Rokach. 2021. Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Computing Surveys (CSUR) 54 5 (2021) 1\u201336.","DOI":"10.1145\/3453158"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"Malek\u00a0Ben Salem Shlomo Hershkop and Salvatore\u00a0J Stolfo. 2008. A survey of insider attack detection research. Insider Attack and Cyber Security: Beyond the Hacker (2008) 69\u201390.","DOI":"10.1007\/978-0-387-77322-3_5"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818040"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00037"},{"key":"e_1_3_3_1_38_2","unstructured":"Aaron Tuor Robert Kaplan Brian Hutchinson Nicole Nichols and Sean Robinson. 2017. Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1710.00811 (2017)."},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"e_1_3_3_1_40_2","unstructured":"USBIF. 2001. USB Device Class Definition for Human Interface Devices (HID) specification document Version 1.11. Retrieved July 24 2024 from https:\/\/www.usb.org\/sites\/default\/files\/hid1_11.pdf"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/618"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283254.3283282"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","acronym":"ICDCN 2025","location":"Hyderabad India"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3700871","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3700871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3700871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":41,"alternative-id":["10.1145\/3700838.3700871","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3700871","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}