Login / Signup
USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Yang Su
Daniel Genkin
Damith Chinthana Ranasinghe
Yuval Yarom
Published in:
USENIX Security Symposium (2017)
Keyphrases
</>
data transmission
smart card
information leakage
countermeasures
storage devices
java card
data sets
neural network
data mining
case study
security mechanisms
security threats
denial of service attacks