Research Article

A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services

Table 5

Classification of vulnerabilities of secure USB flash drives.

VulnerabilityClassificationDescriptionSecurity technology

Implementation vulnerabilityException of public certificateException handling when the public certificate is stored to allow data access(i) Prevention of arbitrary data copying
Password initializationData access through recovery tool after password/data initialization(ii) Data protection after loss
Input count manipulationManipulation of password input count to infer password through brute force attack(iii) Data protection after loss

Environmental vulnerabilityVMwareDisabling of management program using VMware(iv) User authentication and identification
Direct memory accessDirect access to flash drive to read and write data(v) Prevention of arbitrary data copying
Safe modeBooting in safe mode to disable the management program(vi) User authentication and identification
Forced terminationTermination and disabling of management program by force(vii) Prevention of arbitrary data copying
Booting time differenceData access during the time the management program is not run in the booting process(viii) Prevention of arbitrary data copying
EavesdroppingAnalysis of data transferred between the host and the flash drive to obtain the password or password hint(ix) Data encryption/decryption

Unlock commandsSecured domain access commandSending of unlock command to access the secured domain(x) User authentication and identification
Command containing the authentication dataSending of unlock command containing the authentication data to access the secured domain(xi) User authentication and identification

Reverse engineeringAuthentication bypassAnalysis of authentication process of management program to bypass authentication(xii) User authentication and identification
Exposure of encryption/decryption keyAnalysis of data encryption/decryption function of management program to obtain the encryption/decryption key(xiii) User authentication and identification
(xiv) Data encryption/decryption