<--- Back to Details
First PageDocument Content
USB / Computer hardware / Computing / PS/2 port / Y-cable / Bus / Serial communication / Serial ATA / Wireless USB / USB On-The-Go
Date: 2017-08-28 17:01:11
USB
Computer hardware
Computing
PS/2 port
Y-cable
Bus
Serial communication
Serial ATA
Wireless USB
USB On-The-Go

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of Adelaide

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 2,18 MB

Share Document on Facebook

Similar Documents

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide  Damith Ranasinghe University of Adelaide

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of Adelaide

DocID: 1xVSr - View Document

arXiv:1708.09114v1 [cs.CR] 30 AugFirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution Grant Hernandez∗

arXiv:1708.09114v1 [cs.CR] 30 AugFirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution Grant Hernandez∗

DocID: 1xVC4 - View Document

PDF Document

DocID: 1xSo5 - View Document

PDF Document

DocID: 1xScN - View Document

PDF Document

DocID: 1xQHp - View Document