CHAPTER

4

USB Device Overflow

INFORMATION IN THIS CHAPTER

images/bullet Overflow Overview

images/bullet Analyzing This Attack

images/bullet Ever-Present Exposures

images/bullet Overflow Outlook

images/bullet Defensive Strategies

In this chapter, you will learn about USB specifications, drivers, buffers, and types of ...

Get Seven Deadliest USB Attacks now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.