The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January-February (2005 vol.3)
pp: 70-73
Iv? Arce , Core Security Technologies
ABSTRACT
The author analyses how peripheral devices interact with the operating system and what threats that interactions poses.
INDEX TERMS
Peripherals, interfaces, kernels, device drivers, USB security
CITATION
Iv? Arce, "Bad Peripherals", IEEE Security & Privacy, vol.3, no. 1, pp. 70-73, January-February 2005, doi:10.1109/MSP.2005.6
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool