dc.contributor.author | Alendal, Gunnar | |
dc.contributor.author | Axelsson, Stefan | |
dc.contributor.author | Dyrkolbotn, Geir Olav | |
dc.date.accessioned | 2019-12-06T11:48:22Z | |
dc.date.available | 2019-12-06T11:48:22Z | |
dc.date.created | 2019-10-02T22:44:04Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | IFIP Advances in Information and Communication Technology. 2019, 569 101-118. | nb_NO |
dc.identifier.issn | 1868-4238 | |
dc.identifier.uri | http://hdl.handle.net/11250/2632162 | |
dc.description.abstract | The USB Power Delivery protocol enables USB-connected devices to negotiate power delivery and exchange data over a single connection such as a USB Type-C cable. The protocol incorporates standard commands;however, it also enables vendors to add non-standard commands called
vendor-defined messages. These messages are similar to the vendorspecific commands in the SCSI protocol, which enable vendors to specify undocumented commands to implement functionality that meets their needs. Such commands can be employed to enable firmware updates, memory dumps and even backdoors. This chapter analyzes vendor-defined message support in devices that
employ the USB Power Delivery protocol, the ultimate goal being to identify messages that could be leveraged in digital forensic investigations to acquire data stored in the devices. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer | nb_NO |
dc.title | Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 101-118 | nb_NO |
dc.source.volume | 569 | nb_NO |
dc.source.journal | IFIP Advances in Information and Communication Technology | nb_NO |
dc.identifier.doi | 10.1007/978-3-030-28752-8_6 | |
dc.identifier.cristin | 1733263 | |
dc.relation.project | Norges forskningsråd: 248094 | nb_NO |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in IFIP Advances in Information and Communication Technology. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-28752-8_6 | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |