{"title":"The Human Interface Device Attack from the Perspective of the Attacker and the Forensic Analyst","authors":"Sebastián Potocký, J. Stulrajter","doi":"10.23919/NTSP54843.2022.9920414","DOIUrl":null,"url":null,"abstract":"The main prerequisite to extract data from a smartphone or exploit the device is to bypass its lock screen protection. The Human Interface Device (HID) attack is a promising method to break the Android lock screen protection. An attacker can use a smartphone as an attack device. Therefore, this attack can be carried out unnoticed in some cases. This work describes a way to effectively detect the HID attack, whether attack was executed successful or failed, determines its time frame and compares the outputs of several devices from different manufacturers and points out the connections and differences between them. The work examines the defense strategy against HID attack and prevention before losing data in buffers.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 New Trends in Signal Processing (NTSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/NTSP54843.2022.9920414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The main prerequisite to extract data from a smartphone or exploit the device is to bypass its lock screen protection. The Human Interface Device (HID) attack is a promising method to break the Android lock screen protection. An attacker can use a smartphone as an attack device. Therefore, this attack can be carried out unnoticed in some cases. This work describes a way to effectively detect the HID attack, whether attack was executed successful or failed, determines its time frame and compares the outputs of several devices from different manufacturers and points out the connections and differences between them. The work examines the defense strategy against HID attack and prevention before losing data in buffers.