Heimdall
Ivan Zlatanov - NTBHS
Yavor Papazov - CyResLab
The problem
- USB mass storage devices are utilized in cyberattacks
- The problem is weakly addressed
- There is a lack of proper detection and therefore prevention methods
Attacks: USB killer
Attacks: USB killer
Attacks: Alternated firmware
Attacks: Backdoored live-boot OS
Attacks: Malwares
Our approach
- Framework on an embedded system
- Can detect software and theoretically hardware attacks
- Allows developing custom tests for edge cases
- Verifies the integrity of live-boot distributions of Tails
The tests we developed
- Unplugging simulation
- Device type validation
- Vendor information validation
- Antivirus engine scanning
- Input/Output tests
- Live-boot validation
- OS emulation
Software architecture
Hardware modifications
- Port Extender
- USB Killer Detector
- Port Power Controller
Port Extender
Hardware architecture
Conclusion
Check it out:
Acknoledgments
- To Yavor Papazvo and Konstantin Delchev., for the help of the choice of research topic and guidance during the development process.
- To the team of SAP Labs GK, for the valuable feedback.
- Georgi Sharkov, for providing me test devices.
Heimdall [ENG]
By Ivan Zlatanov
Heimdall [ENG]
- 123