Leveraging USB to Establish Host Identity Using Commodity Devices
Download: Paper (PDF)
Date: 22 Feb 2014
Document Type: Briefing Papers
Additional Documents: Slides
Associated Event: NDSS Symposium 2014
Determining a computer’s identity is critically important, but even hosts with trusted computing hardware can be defeated by relay and impersonation attacks. Through observing USB stack timing characteristics, we leverage Android devices and machine learning techniques to detect virtualized environments, and uniquely fingerprint hosts amidst fields of identically specified machines.