skip to main content
10.1145/3457340.3458299acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open Access

BadUSB-C: Revisiting BadUSB with Type-C

Published:04 June 2021Publication History

ABSTRACT

The security of the USB protocol has been paid extensive attention to because of its wide usage. Due to the trust-by-default characteristics, USB security has caused severe problems. In this work, we extended BadUSB to support the new USB Type-C features and proposed a multi-mode attack model, BadUSB-C. This obtains UI status to make attacks more precise and effective. To the best of our knowledge, BadUSB-C is the first attack model utilizing USB Type-C. To validate the usability and effectiveness, we conducted extensive experiments to simulate daily usage and summarized the private information collected. We also discussed the recommended countermeasures for our attack model, including isolated UI rendering, which may be inspiring for future research on defense methods. This paper describes the journey of discovering BadUSB-C in my CS315 Computer Security course taught in the Fall 2020 semester.

References

  1. Common vulnerabilities and exposures, 2020.Google ScholarGoogle Scholar
  2. I. M. R. S. Apple, Hewlett-Packard and T. Instruments. Universal serial bus 3.2 specification, 2017.Google ScholarGoogle Scholar
  3. EverybodyWiki. List of devices with video output over usb-c, 2021.Google ScholarGoogle Scholar
  4. R. P. Foundation. Raspberry pi 4B, 2019.Google ScholarGoogle Scholar
  5. I. HP et al. Universal serial bus 3.0 specification, 2008.Google ScholarGoogle Scholar
  6. I. HP et al. Universal serial bus 3.1 specification, 2013.Google ScholarGoogle Scholar
  7. M. T. Incorporated. ATmega32u4 chip, 2016.Google ScholarGoogle Scholar
  8. U. G. Limited. UGREEN company introduction, 2012.Google ScholarGoogle Scholar
  9. H. Lu, Y. Wu, S. Li, Y. Lin, C. Zhang, and F. Zhang. BadUSB-C: Revisiting BadUSB with Type-C. In 15th IEEE Workshop on Offensive Technologies, WOOT, 2021.Google ScholarGoogle Scholar
  10. K. Nohl and J. Lell. Badusb-on accessories that turn evil. Black Hat USA, 1(9):1--22, 2014.Google ScholarGoogle Scholar
  11. J. D. Tian, N. Scaife, D. Kumar, M. Bailey, A. Bates, and K. R. B. Butler. Sok: "plug & pray" today - understanding USB insecurity in versions 1 through C. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21--23 May 2018, San Francisco, California, USA, pages 1032--1047. IEEE Computer Society, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  12. F. Zhang. Fall 2019 Semester: CS315 Computer Security. https://fengweiz.github.io/19fa-cs315/index.html, 2019.Google ScholarGoogle Scholar
  13. F. Zhang. Fall 2020 Semester: CS315 Computer Security. https://fengweiz.github.io/20fa-cs315/index.html, 2020.Google ScholarGoogle Scholar

Index Terms

  1. BadUSB-C: Revisiting BadUSB with Type-C

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems
      June 2021
      62 pages
      ISBN:9781450384032
      DOI:10.1145/3457340
      • Program Chairs:
      • Weizhi Meng,
      • Li Li

      Copyright © 2021 Owner/Author

      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 June 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)128
      • Downloads (Last 6 weeks)17

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader