Bad Peripherals

  • Authors:
  • Ivan Arce

  • Affiliations:
  • Core Security Technologies

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The author analyses how peripheral devices interact with the operating system and what threats that interactions poses.