Anton Beitler

Learn More
Attacks that leverage USB as an attack vector are gaining popularity. While attention has so far focused on attacks that either exploit the host's USB stack or its unrestricted device privileges, it is not necessary to compromise the host to mount an attack over USB. This paper describes and implements a <i>USB sniffing</i> attack. In this attack a USB(More)
  • 1