Issue No. 01 - January-February (2005 vol. 3)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.6
Iv? Arce , Core Security Technologies
The author analyses how peripheral devices interact with the operating system and what threats that interactions poses.
Peripherals, interfaces, kernels, device drivers, USB security
Iv? Arce, "Bad Peripherals", IEEE Security & Privacy, vol. 3, no. , pp. 70-73, January-February 2005, doi:10.1109/MSP.2005.6