This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Bad Peripherals
January-February 2005 (vol. 3 no. 1)
pp. 70-73
Iv? Arce, Core Security Technologies
The author analyses how peripheral devices interact with the operating system and what threats that interactions poses.
Index Terms:
Peripherals, interfaces, kernels, device drivers, USB security
Citation:
Iv? Arce, "Bad Peripherals," IEEE Security & Privacy, vol. 3, no. 1, pp. 70-73, Jan.-Feb. 2005, doi:10.1109/MSP.2005.6
Usage of this product signifies your acceptance of the Terms of Use.