Menu
Aussie researchers lift the lid on USB "crosstalk" vulnerability

Aussie researchers lift the lid on USB "crosstalk" vulnerability

Information can be unknowingly leaked to external USB devices

Research carried out by the University of Adelaide has found that 90 per cent of computers and external USB hubs leaked information to external USB devices thanks to a kind of electronic "crosstalk" between connected components.

More than 50 different computers and external USB hubs were tested showing that sensitive information such as keystrokes can be captured.

The leak was identified through the use of a modified cheap novelty plug-in lamp with a USB connector to read every key stroke from the adjacent keyboard USB interface. The data was sent via Bluetooth to another computer.

According to research associate at the University of Adelaide’s School of Computer Science, Dr. Yuval Yarom, this "channel-to-channel crosstalk leakage" is analogous to water leaking from pipes.

“Electricity flows like water along pipes – and it can leak out. In our project, we showed that voltage fluctuations of the USB port’s data lines can be monitored from the adjacent ports on the USB hub.”

Yarom led the research, with collaboration by University of Adelaide student Yang Su, Dr. Daniel Genkin from the University of Pennsylvania and University of Maryland and Dr. Damith Ranasinghe, Auto-ID Lab, University of Adelaide. 

“USB-connected devices include keyboards, cardswipers and fingerprint readers which often send sensitive information to the computer,” Dr. Yarom said.

“It has been thought that because that information is only sent along the direct communication path to the computer, it is protected from potentially compromised devices.

“But our research showed that if a malicious device or one that’s been tampered with is plugged into adjacent ports on the same external or internal USB hub, this sensitive information can be captured. That means keystrokes showing passwords or other private information can be easily stolen.”

Yarom suggested that the solution to the leak issue would be to redesign USB connections to make them more secure.

“The USB has been designed under the assumption that everything connected is under the control of the user and that everything is trusted – but we know that’s not the case. The USB will never be secure unless the data is encrypted before it is sent,” he said.

The research associate also said that people should not connect anything to USB unless 100 per cent sure that connector is safe.

“For users it usually means not to connect to other people's devices. For organisations that require more security, the whole supply chain should be validated to ensure that the devices are secure.”

The results of the research will be presented at the USENIX Security Symposium in Vancouver, Canada next week.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags information securityUSBUniversity of Adelaideleak

More about University of Adelaide

Show Comments
[]