This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1355
USBGuard
External Tool
External Data Source
GitHub
Unknown
Unknown
51 (lowest rank is 51)

Category & Restrictions

Other
blacklists, cyber crime, cyber defense
Unrestricted
true

Description


USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as method of use policies (how a USB device may interact with the system)

The USBGuard software framework helps to protect your computer against rogue USB devices (a.k.a. BadUSB) by implementing basic whitelisting and blacklisting capabilities based on device attributes.

Features:
- Rule language for writting USB device authorization policies
- Daemon component with an IPC interface for dynamic interaction and policy enforcement
- Command line and GUI interface to interact with a running USBGuard instance
- C++ API for interacting with the daemon component implemented in a shared library

Supported Operating Systems:
Currently, USBGuard works only on Linux. To enforce the user-defined policy, it uses the USB device authorization feature implemented in the Linux kernel since 2007.

Additional Details

3.4MB
false
Unknown
spamming, computer buses, usb, application programming interface, database application, authorization, rogue software, external data source, usbguard, 1355, computer architecture, embedded system, rogue security software, blacklisting, scareware, firmware, physical layer protocols, malware, operating system, antivirus software, inferlink corporation, command line interface, technical communication, user interface, whitelisting, information operations and warfare