CHAPTER

4

USB Device Overflow

INFORMATION IN THIS CHAPTER

images/bullet Overflow Overview

images/bullet Analyzing This Attack

images/bullet Ever-Present Exposures

images/bullet Overflow Outlook

images/bullet Defensive Strategies

In this chapter, you will learn about USB specifications, drivers, buffers, and types of ...

Get Seven Deadliest USB Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.