Leveraging USB to Establish Host Identity Using Commodity Devices presented at NDSS 2014

by Adam Bates, Hannah Pruse, Kevin Butler, Ryan Leonard, Daniel Lowd,

Summary : Determining a computer’s identity is critically important, but even hosts with trusted computing hardware can be defeated by relay and impersonation attacks. Through observing USB stack timing characteristics, we leverage Android devices and machine learning techniques to detect virtualized environments, and uniquely fingerprint hosts amidst fields of identically specified machines.