The mission of USB Defender is to eliminate the USB security threats that cannot be stopped by virus scanning software in a way that is compatible with USB's "plug-and-play" design philosophy.
2. With the announcement of "BadUSB" in 2014, the world learned that billions of
our trusted USB devices are vulnerable to reprogramming.
BadUSB and USB Trojan attack platforms place the malware in the device’s
USB controller code, where it is invisible to virus protection software.
The mission of USB Defender is to eliminate the USB security threats that
cannot be stopped by virus scanning software in a way that is compatible with
USB's "plug-and-play" design philosophy.
We will deliver USB Defender technology in three product forms: chips, single
port dongle, and multiport USB hubs.
The core element of USB Defender is protected under a 2014 patent.
Motivation
4. Problem #1 USB devices can be reprogrammed.
BadUSB is “undetectable and unfixable” – Forbes
Problem #2 A reprogrammed USB device can compromise your computer.
USB drives can be reprogrammed to silently infect computers – PC World
The convenience of USB Plug-and-Play made it vulnerable from the start.
USB Devices are computers that self-identify, can lie, and can change their identity over time.
Problem #3 “off the shelf” USB virus creation platforms are available.
Hak5’s Bash Bunny and Rubber Ducky
The Problem
No known protection strategy.
5. Market Size: $4.9 Billion:
Estimates based on 2 Billion Personal Computers in use (2015)
Forrester Research
1.2 Billion Hub Market (3% of PCs, using a $20 price)
1.2 Billion Dongle Market (6% of PC users using a $10 price)
2.5 Billon PC / USB Docking station market (1% of PCs, using a $125 price)
Opportunity
6. Adapt-IP:
Founded October 2009
Objective:
Use HW High Level Synthesis design to create new products
Initial Product Focus: USB, 802.11ah, H.265 video encoding
USB Defender:
Spun out as separate company Oct 2015
Created as pure play that focused on USB security
Strategy: effective monetization of USB Defender value
Company History
7. Staffing
All original designers are still involved
Technology:
USB 2.0, USB 3.0, USB Defender
Prototype:
FPGA-based 3 Port USB 2.0 USB Defender Hub
Company Status
8. Straff Wentworth, Founder and CEO
VP of USB Products at Adapt-IP and VP of Engineering PublishOne.
Director of Core IRIX for SGI and Cray Research Teams.
Mike Kentley, CTO
USB Domain expert.
Michael McNamara, Founder and Investor
Executive team member of three successful high tech exits, including
IPO (Verisity Ltd)
CEO of Adapt-IP.
John Sanguinetti, Chairman
Founder of two successful startups, investor in dozens more.
Team
Team Link
9. USB Defender
* An all hardware / no-CPU USB firewall
* Deep packet inspection at speed
* Allow or disallow any operation
* Same production costs
* Better protection than USB-C Authentication
Productization Options
Secure Hub
Secure KVM switch
Secure Dongle
Our Solution
USB Defender Product Family
Defended port
Extension port
Defended port
Defended port
USB Ports
protected with
USB Defender
Video: DemoVideo: The USB Security Threat
10. Push hard on web presence (LinkedIn, Facebook, YouTube, Google)
Focus on the Consumer Market:
They do not have IT security administrators to protect them.
They understand that USB has security threats and are wanting a solution.
USB defender provides a simple UX. It just works.
There are protected ports and extension ports.
Use Kickstarter to promote company and USB Defender concept.
Partner with an existing consumer brand.
Work with USB manufacturers to create effective giveaway programs.
Marketing Strategy
12. USB Defender Prototype
USB Defender Technology:
USB 2.0, USB 3.0
PHY: ULPI, UTMI
USB Defender Prototype:
Xilinx Artix7 75T, 25K LUTs used
USB 2.0, ULPI (Microchip USB3340)
Hub: up port USB-C,
3 Type-A down ports
Board Powered via USB or 5V supply
Board Dimensions: 3.15 in x 2.1 in
13. Primary Product Features:
Protection from BadUSB Virus – USB devices are protected from reprogramming
Protection from USB Trojan Virus -- Dedicated ports or dynamic ports
Dedicated ports for keyboard, mouse, and mass storage; or
Ports accept keyboard, mouse, and mass storage, but once device is accepted it cannot change.
Optional Product Features:
Protection from hijacked keyboard or mouse
Bluetooth enabled proximity detection
Protection from alternate system boot
Trojan Boot and boot from memory stick blocked
Protection from autorun of programs
Prevent autorun.inf
Demo of USB Defender
USB Defender
Technology Productization Options
USB Defender Hub
14. USB Defender
email us: info@usb-defender.com
Learn More
Protecting you from USB based attacks
16. USB Trojan attacks can only be stopped by active monitoring.
USB Defender is an all hardware solution:
It allows the data I/O to operate at speed. It cannot be hacked.
USB defender provides a simple User Experience (UX).
USB virus protection software is very complex to use.
USB Defender provides a simple UX. Plug it in and you are protected.
A software solution cannot provide a uniform USB protection experience across:
PC / Workstations, Hubs, and Docking Stations.
USB Defender can provide a uniform USB protection experience.
USB Defender protects your devices when plugged into a foreign system:
USB sticks can be protected by a USB Dongle.
Why is USB Defender
the right USB choice?
18. USB Common Criteria
Mitigates USB Trojan attacks via tamper resistance, lab testing, and certification
FIPS 140-2 Level 2+
Mitigates USB Trojan attacks via tamper resistance and validation in NTIS labs
USB Type-C Authentication
Mitigates USB Trojan attacks via tamper resistance and secure validation
USB device management software
Mitigates USB Trojan attacks by limiting:
Which workstations (USB ports) can connect to USB devices
Which devices (manufacturer, product ID) are allowed to connect
Overview of USB Trojan
Mitigation Methods
19. Security standards were in place before 2014 that would have prevented BadUSB
2001 – FIPS 140-2 Level 2
2007 -- USB Common Criteria Published (est)
2010 – NSA – enterprise network USB memory stick detection & management (opensource)
2012 -- Semantic & IronKey – Enterprise management of USB device access
But USB security standards were not adopted by USB manufacturers
Increased complexity and costs limited market adoption of security standards
We estimate that security complying devices represent less than 1% of the market
BadUSB
should have been a non-event
20. USB Type-C Power Cable issues are being resolved without Type-C Authentication
In 2015 and 2016 the market experienced numerous bad power cable issues.
Amazon and others took action.
They now sell only USB-IF certified cables -- which do not include Type-C Authentication
The market has accepted the USB-IF logo as trustworthy indicator
If the market is satisfied with the safety of regular USB-IF certified cables,
will consumers really pay more for cables with Type-C Authentication?
History has shown that consumers value price over security
Type-C Authenticated cables and devices will be more expensive.
Conclusion / USB Type-C Authentication Market Adoption Projection
Type-C Authentication will have a market adoption profile similar to other USB Security standards.
An aggressive estimate is that Type-C Authentication will capture 3% of the USB device market.
Will USB Type-C Authentication solve things?
We think not