Heimdall

Author: Ivan Zlatanov, NTBHS

Mentor: Yavor Papazov, VMWare

USB mass storage devices threat evaluation using an embedded system 

The problem that we explore

  • The high count of cyberattacks, executed or delivered via USB mass storage devices;
  • Device exploitation mechanisms, such as BadUSB, USBee, and Cottonmouth;
  • The lack of adequate detection and defense methods for such devices and attacks, leading to the ban of such devices in multiple governments and private facilities.

What is Heimdall

  • A stack of USB devices threat evaluation methods;
  • Implemented into an open-source Python 3.x framework, called Heimdall Framework;
  • All running on a modified Raspberry Pi 4 with a custom hardware port controller. 

General architecture

The testing device

  • Raspberry Pi 4;
  • External hardware power controller for the USB ports;

Heimdall Framework

  • Open-source Python 3.x framework;
  • Built for Raspberry Pi based devices;
  • Executes multiple USB device evaluation tests:
    • Unplugging simulation;
    • Device type validation;
    • Vendor information validation;
    • Virus scan;
    • Input/Output test;
    • Linux-based live distributions validation.
  • Supports custom security tests via a plugin management system.

Heimdall Framework Architecture

Further Development

Expanding the scope of HID tests

Rapid prototyping of the device's case

Researching BSD and Linux exploits and developing proper detection mechanisms

Link to the framework:

Thank you

Questions

Heimdall

By Ivan Zlatanov

Heimdall

  • 35