CHAPTER

4

USB Device Overflow

INFORMATION IN THIS CHAPTER

images/bullet Overflow Overview

images/bullet Analyzing This Attack

images/bullet Ever-Present Exposures

images/bullet Overflow Outlook

images/bullet Defensive Strategies

In this chapter, you will learn about USB specifications, drivers, buffers, and types of ...

Get Seven Deadliest USB Attacks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.