Project Description

USB devices can be dangerous to read directly from your PC. There are countless stories of PCs being infected (e-g: filesystem encrypted) because a USB device was read without first checking the USB content. But how do you check the device content without having a look at it first?!

If we could fire up a virtual machine on the PC that could read from the USB device first, we'd be able to protect our PC: if any malware ran on the device, it would only affect the virtual machine.

Goal for this Hackweek

Start up a virtual machine from the PC where the USB key is inserted to read from that USB key: - disable the USB port on the PC - enable PCI passthrough for this USB port to be read from the virtual machine - use QEMU + vfio to load the necessary driver/kernel modules in the virtual machine - read the USB key from the virtual machine - if time permits, automatically run the virtual machine as soon as a "USB inserted" event occurs.

Resources

Looking for hackers with the skills:

security virtualization

This project is part of:

Hack Week 22

Activity

  • 11 days ago: roseswe started this project.
  • 17 days ago: nguyens added keyword "security" to this project.
  • 17 days ago: nguyens added keyword "virtualization" to this project.
  • 17 days ago: nguyens originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    Run sandboxed Firefox with image and sound inside a container by nguyens

    [comment]: # (Please use the project descriptio...


    Rancher Token Revoker by mbolot

    [comment]: # (Please use the project descriptio...


    Create tool for managing RPM package signing keys by dheidler

    [comment]: # (Please use the project descriptio...


    Expanding e2e tests on Windows self-hosted runners via CI by iguimaraes

    Achievements:

    • Documented all necessary s...


    Build a Unikernel that runs WebAssembly by flavio_castelli

    [comment]: # (Please use the project descriptio...