skip to main content
10.1145/2523514.2527002acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Exploring attack vectors facilitated by miniaturized computers

Authors Info & Claims
Published:26 November 2013Publication History

ABSTRACT

The development of miniaturized, inexpensive, fully functional computers has opened up new opportunities for a pentester. A device approximately the length and width of a credit card and only a couple inches high, is capable of running a version of the GNU/Linux operating system, which makes the access to many tools such as network mappers and exploitation frameworks possible. Due to its size, the device can be hidden inside a building and attached to the network for as long as it has power, affording a great advantage to an attacker. In this paper, we attempt to explore different attack vectors facilitate by miniaturized computers and identify their feasibilities. We also make recommendations of countermeasures to the potential attacks launched through miniaturized computers.

References

  1. New $74 Android mini computer is slightly larger than a thumb drive, http://arstechnica.com/gadgets/2012/05/new-74-android-mini-computer-is-slightly-larger-than-a-thumb-drive/.Google ScholarGoogle Scholar
  2. BeagleBone, http://beagleboard.org/static/beaglebone/latest/README.htmGoogle ScholarGoogle Scholar
  3. H. Berghel and H. Uecker. WiFi attack vectors. Communications of the ACM, 48(8): 21--28, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. What is Cotton Candy? http://www.fxitech.com/cotton-candy/what-is-it/Google ScholarGoogle Scholar
  5. Nmap, http://nmap.orgGoogle ScholarGoogle Scholar
  6. pwnieexpress. A raspberry pi pentesting suite by pwnie express. https://github.com/pwnieexpress/Raspberry-Pwn.Google ScholarGoogle Scholar
  7. Pwn Plug Elite, http://pwnieexpress.com/products/pwnplug-eliteGoogle ScholarGoogle Scholar
  8. Raspberry Pi, http://www.raspberrypi.orgGoogle ScholarGoogle Scholar
  9. Reaver-wps. Brute force attack against wifi protected setup. https://code.google.com/p/reaver-wps/.Google ScholarGoogle Scholar
  10. C. Roberts. Biometric attack vectors and defences. Computer & Security, 26: 14--25, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Salerno, A. Snazgiri, and S. Upadhyaya. Exploration of attacks on current generation smartphones. In Proc. of the 8th International Conference on Mobile Web Information Systems (MobiWIS), pages 546--553, Niagara Falls, Ontario, Canaga, Sept. 19--21, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  12. S. A. Shaikh, H. Chivers, O. Nobles, J. A. Clark, and H. Chen. Network reconnaissance. Network Security, 2008(11): 12--16, Nov. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. F. Skopik and Z. Ma. Attack vectors to metering data in smart grids under security constraints. In Proc. of IEEE 36th International Conference on Computer Software and Applications Workshops (COMPSAC 2012), pages 134--139, Izmir, Turkey, July 16--20, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Sood and R. Enbody. Targeted cyber attacks: a superset of advanced persistent threats. IEEE Security & Privacy, 11(1): 54--61, Jan.--Feb. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Viehböck. Brute forcing wi-fi protected setup. http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdfGoogle ScholarGoogle Scholar
  16. Wifi-pineapple, http://hakshop.myshopify.com/products/wifi-pineappleGoogle ScholarGoogle Scholar

Index Terms

  1. Exploring attack vectors facilitated by miniaturized computers

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
          November 2013
          483 pages
          ISBN:9781450324984
          DOI:10.1145/2523514

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 November 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate102of289submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader