First Page | Document Content | |
---|---|---|
![]() Date: 2016-01-05 18:49:40Computing Network protocols Information and communications technology Internet of things Web of Things World Wide Web Computer network USB Protocol stack Internet protocol suite | Add to Reading List |
![]() | USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of AdelaideDocID: 1xVSr - View Document |
![]() | arXiv:1708.09114v1 [cs.CR] 30 AugFirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution Grant Hernandez∗DocID: 1xVC4 - View Document |
![]() | PDF DocumentDocID: 1xSo5 - View Document |
![]() | PDF DocumentDocID: 1xScN - View Document |
![]() | PDF DocumentDocID: 1xQHp - View Document |