{"title":"从攻击者和取证分析者的角度看人机界面设备攻击","authors":"Sebastián Potocký, J. Stulrajter","doi":"10.23919/NTSP54843.2022.9920414","DOIUrl":null,"url":null,"abstract":"The main prerequisite to extract data from a smartphone or exploit the device is to bypass its lock screen protection. The Human Interface Device (HID) attack is a promising method to break the Android lock screen protection. An attacker can use a smartphone as an attack device. Therefore, this attack can be carried out unnoticed in some cases. This work describes a way to effectively detect the HID attack, whether attack was executed successful or failed, determines its time frame and compares the outputs of several devices from different manufacturers and points out the connections and differences between them. The work examines the defense strategy against HID attack and prevention before losing data in buffers.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The Human Interface Device Attack from the Perspective of the Attacker and the Forensic Analyst\",\"authors\":\"Sebastián Potocký, J. Stulrajter\",\"doi\":\"10.23919/NTSP54843.2022.9920414\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The main prerequisite to extract data from a smartphone or exploit the device is to bypass its lock screen protection. The Human Interface Device (HID) attack is a promising method to break the Android lock screen protection. An attacker can use a smartphone as an attack device. Therefore, this attack can be carried out unnoticed in some cases. This work describes a way to effectively detect the HID attack, whether attack was executed successful or failed, determines its time frame and compares the outputs of several devices from different manufacturers and points out the connections and differences between them. The work examines the defense strategy against HID attack and prevention before losing data in buffers.\",\"PeriodicalId\":103310,\"journal\":{\"name\":\"2022 New Trends in Signal Processing (NTSP)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 New Trends in Signal Processing (NTSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/NTSP54843.2022.9920414\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 New Trends in Signal Processing (NTSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/NTSP54843.2022.9920414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Human Interface Device Attack from the Perspective of the Attacker and the Forensic Analyst
The main prerequisite to extract data from a smartphone or exploit the device is to bypass its lock screen protection. The Human Interface Device (HID) attack is a promising method to break the Android lock screen protection. An attacker can use a smartphone as an attack device. Therefore, this attack can be carried out unnoticed in some cases. This work describes a way to effectively detect the HID attack, whether attack was executed successful or failed, determines its time frame and compares the outputs of several devices from different manufacturers and points out the connections and differences between them. The work examines the defense strategy against HID attack and prevention before losing data in buffers.