{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:36Z","timestamp":1755225216845,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3710816","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:33:18Z","timestamp":1755066798000},"page":"1003-1015","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8286-5135","authenticated-orcid":false,"given":"Andrea","family":"Ciccotelli","sequence":"first","affiliation":[{"name":"CEMSE, King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8237-0539","authenticated-orcid":false,"given":"Maurantonio","family":"Caprolu","sequence":"additional","affiliation":[{"name":"CEMSE, King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"CEMSE, King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2001. Device Class Definition for Human Interface Devices (HID). https:\/\/usb.org\/sites\/default\/files\/hid1_11.pdf"},{"key":"e_1_3_3_2_3_2","unstructured":"2014. Black Hat USA 2014. https:\/\/www.blackhat.com\/us-14\/briefings.html#badusb-on-accessories-that-turn-evil"},{"key":"e_1_3_3_2_4_2","first-page":"61","volume-title":"Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)","author":"Angelopoulou Olga","year":"2019","unstructured":"Olga Angelopoulou, Seyedali Pourmoafi, Andrew Jones, and Gaurav Sharma. 2019. Killing your device via your usb port. In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019). The Centre for Security, Communications and Network Research (CSCAN), 61\u201372."},{"key":"e_1_3_3_2_5_2","volume-title":"Stuxnet","author":"Baezner Marie","year":"2017","unstructured":"Marie Baezner and Patrice Robin. 2017. Stuxnet. Technical Report. ETH Zurich."},{"key":"e_1_3_3_2_6_2","unstructured":"Petar\u00a0D Bojovic Ilija Basicevic Milos Pilipovic Zivko Bojovic and Milena Bojovic. 2019. The rising threat of hardware attacks: Usb keyboard attack case study. Preprint (2019)."},{"key":"e_1_3_3_2_7_2","unstructured":"BS\u00a0Vishnu Charan and Lalit Kulkarni. 2022. Enhancement And Implementation Of Badusb Attacks Using Microcontrollers. Journal of Positive School Psychology 6 9 (2022) 563\u2013573."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2012.42"},{"key":"e_1_3_3_2_9_2","unstructured":"Andrea Ciccotelli Maurantonio Caprolu and Roberto Di\u00a0Pietro. 2025. NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacks (Author Version). https:\/\/cri-lab.net\/wp-content\/uploads\/2025\/01\/NoBU_Authors.pdf."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"John Clark Sylvain Leblanc and Scott Knight. 2011. Compromise through usb-based hardware trojan horse device. Future Generation Computer Systems 27 5 (2011) 555\u2013563.","DOI":"10.1016\/j.future.2010.04.008"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2011.5929130"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833595"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174220"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60618-3"},{"key":"e_1_3_3_2_15_2","volume-title":"USENIX Security Symposium","author":"Dumitru Robert","year":"2023","unstructured":"Robert Dumitru, Daniel Genkin, Andrew Wabnitz, and Yuval Yarom. 2023. The Impostor Among US (B): Off-Path Injection Attacks on USB Communications. In USENIX Security Symposium."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18272-3_19"},{"key":"e_1_3_3_2_17_2","unstructured":"Dan Goodin. 2013. Meet \u201cbadBIOS \u201d the mysterious Mac and PC malware that jumps airgaps. ars technica 31 10 (2013). https:\/\/arstechnica.com\/information-technology\/2013\/10\/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps\/"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7907004"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Omar\u00a0Adel Ibrahim Savio Sciancalepore Gabriele Oligeri and Roberto Di\u00a0Pietro. 2020. Magneto: Fingerprinting usb flash drives via unintentional magnetic emissions. ACM Transactions on Embedded Computing Systems (TECS) 20 1 (2020) 1\u201326.","DOI":"10.1145\/3422308"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228624"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00066"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Koffi\u00a0Anderson Koffi Christos Smiliotopoulos Constantinos Kolias and Georgios Kambourakis. 2024. To (US)Be or Not to (US)Be: Discovering Malicious USB Peripherals through Neural Network-Driven Power Analysis. Electronics 13 11 (2024). 10.3390\/electronics13112117","DOI":"10.3390\/electronics13112117"},{"key":"e_1_3_3_2_23_2","volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"Maskiewicz Jacob","year":"2014","unstructured":"Jacob Maskiewicz, Benjamin Ellis, James Mouradian, and Hovav Shacham. 2014. Mouse trap: Exploiting firmware updates in { USB} peripherals. In 8th USENIX Workshop on Offensive Technologies (WOOT 14)."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3289100.3289121"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/IC2IE50715.2020.9274566"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-6_18"},{"key":"e_1_3_3_2_27_2","unstructured":"Rekha\u00a0Kulkarni Pravin\u00a0Phule. 2015. Unintentional use of USB Channels and Protection. International Journal of Current Engineering and Technology 5 1 (2015) 288\u2013299."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/IC2IE50715.2020.9274631"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"E. Schrodinger. 1926. An Undulatory Theory of the Mechanics of Atoms and Molecules. Phys. Rev. 28 (Dec 1926) 1049\u20131070. Issue 6. 10.1103\/PhysRev.28.1049","DOI":"10.1103\/PhysRev.28.1049"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818040"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00037"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Grigoris Tzokatziou Leandros\u00a0A Maglaras Helge Janicke and Ying He. 2015. Exploiting SCADA vulnerabilities using a human interface device. Int J Adv Comput Sci Appl (2015) 234\u2013241.","DOI":"10.14569\/IJACSA.2015.060731"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1109\/ICMLC.2004.1382337","volume-title":"Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826)","volume":"2","author":"Xu Yan-Bin","year":"2004","unstructured":"Yan-Bin Xu and Feng Dong. 2004. Research on communication method of electrical resistance tomography system based on USB technique. In Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826) , Vol.\u00a02. IEEE, 1019\u20131024."}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3710816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:26:07Z","timestamp":1755069967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3710816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":32,"alternative-id":["10.1145\/3708821.3710816","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3710816","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}