Issue No.01 - January-February (2005 vol.3)
Iv? Arce , Core Security Technologies
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.6
The author analyses how peripheral devices interact with the operating system and what threats that interactions poses.
Peripherals, interfaces, kernels, device drivers, USB security
Iv? Arce, "Bad Peripherals", IEEE Security & Privacy, vol.3, no. 1, pp. 70-73, January-February 2005, doi:10.1109/MSP.2005.6