USBKey Remote Hijacking Technical Analysis
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Authentication technology plays an important role in the open environment for information system, so people continue to explore practical applications, to find a series of authentication technology. With cryptography, smart card technology developing and maturing, a combination of modern cryptography, smart chip, USB authentication technology has finally appeared in front of us. In this paper we find a detection technique based on API Hook, used to verify the identity authentication based on USBKey.

    Reference
    Related
    Cited by
Get Citation

潘建军,王加阳,罗海波. USBKey 远程劫持技术分析.计算机系统应用,2011,20(10):172-174

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:February 24,2011
  • Revised:April 11,2011
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063