Issue No. 01 - January-February (2005 vol. 3)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.6
Iv? Arce , Core Security Technologies
The author analyses how peripheral devices interact with the operating system and what threats that interactions poses.
Peripherals, interfaces, kernels, device drivers, USB security
I. Arce, "Bad Peripherals," in IEEE Security & Privacy, vol. 3, no. , pp. 70-73, 2005.