Authentication in Transient Storage Device Attachments

  title={Authentication in Transient Storage Device Attachments},
  author={Donald Rich},
  • D. Rich
  • Published 1 April 2007
  • Computer Science
  • Computer
The world has witnessed explosive growth in the use of personal storage devices such as USB flash drives. Until recently, no standard authentication method existed for these devices. To meet this need, the IEEE Computer Society's standards committees on information assurance and storage systems have developed the IEEE 1667 standard protocol for authentication in host attachments of transient storage devices. IEEE 1667 defines bidirectional TSD authentication: the host can authenticate the TSD's… 

Figures from this paper

Security Threats and Mitigating Risk for USB Devices
Computer users have consistently sought out improvements to devices for removable storage to provide the quickest and most efficient means of transferring data from one computer to another. Portable
USBWall: A novel security mechanism to protect against maliciously reprogrammed USB devices
The proposed USBWall uses BeagleBone Black, a low-cost open-source computer, to act as a middleware to enumerate the devices on behalf of the host to protect the host via a software/hardware solution.
Authentication Service System Based on Parallel Computation
Results show that the proposed security authentication server system has a strong anti-attack capability, speed certification and stability of the structure characteristics, and the safety program is evaluated.
Remote Wiping and Secure Deletion on Mobile Devices: A Review
The literature is surveyed, focusing on existing approaches to secure flash storage deletion and a critical analysis and comparison of a variety of published research in this area is provided, to obtain a better understanding of remote wiping.
Classified removable storage medium control based on the access control matrix
  • Degang Sun, W. Yang, Meng Zhang, Shaojia Huang
  • Computer Science, Engineering
    The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)
  • 2014
A security model of the removable storage medium control based on ACM (Access Control Matrix) model combined with access control strategies is established, which gives the model's safety and reliability demonstration on data interaction between the computer system and the classified mobile storage medium.
SoK: "Plug & Pray" Today – Understanding USB Insecurity in Versions 1 Through C
This work survey and categorize USB attacks and defenses, unifying observations from both peer-reviewed research and industry, and develops the first formal verification of the recently released USB Type-C Authentication specification, and uncover fundamental flaws in the specification's design.
USBeSafe: Applying One Class SVM for Effective USB Event Anomaly Detection
This thesis presents USBeSafe as a first-of-its-kind machine learning-based anomaly detection framework for detecting a specific subclass of rogue-TD attack in which a covert keyboard interface is defined on a seemingly benign device.
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks
This paper proposes USBESAFE as a mediator of the USB communication mechanism and proposes techniques to generate a protection model that can identify covert USB attacks by distinguishing BadUSB devices as a set of novel observations.
End-User Awareness of and Adherence to Crisis Preparedness of the Information Systems in New Zealand Organisations
A crisis is a specific, unanticipated, and non-routine event that generates high levels of uncertainty and jeopardizes high value priorities such as life, economic well-being, or physical