On the basis of the more and more use of the electric testing and in-formation processing technology in the world.This paper introduces the basic concepts of virtual instrument,analysis how to makethe most effect for ...On the basis of the more and more use of the electric testing and in-formation processing technology in the world.This paper introduces the basic concepts of virtual instrument,analysis how to makethe most effect for gen-eral computer,discusses the principle and the characteristics of the hardware and the software for the USBsystem,which connect the PC and the test device.It also explains the working modelfor this kind of system by meansof an ex-ampleand the application methodsof somerelative software tools.展开更多
USB HID攻击技术是近年来新兴的一种恶意硬件攻击技术,利用USB HID协议漏洞伪造用户击键内容获取控制权限.这种技术将恶意代码隐藏在芯片固件内,现有的反病毒软件和入侵检测系统无法防御.而且它发展迅速,波及范围广,已经严重威胁到了用...USB HID攻击技术是近年来新兴的一种恶意硬件攻击技术,利用USB HID协议漏洞伪造用户击键内容获取控制权限.这种技术将恶意代码隐藏在芯片固件内,现有的反病毒软件和入侵检测系统无法防御.而且它发展迅速,波及范围广,已经严重威胁到了用户的隐私安全.从USB协议层面分析了这种攻击技术的原理,并总结整理了这种技术自出现以来至今的发展历程.并且对比分析现有防护技术优劣,并由此讨论了未来安全体系应对恶意硬件的防护策略.展开更多
文摘On the basis of the more and more use of the electric testing and in-formation processing technology in the world.This paper introduces the basic concepts of virtual instrument,analysis how to makethe most effect for gen-eral computer,discusses the principle and the characteristics of the hardware and the software for the USBsystem,which connect the PC and the test device.It also explains the working modelfor this kind of system by meansof an ex-ampleand the application methodsof somerelative software tools.