28 Dec 2014

Transforming USB Malware Into Snitches

Years ago I became deeply interested in trojans that were deployed to USB devices. At the time there were a number of vulnerabilities such as autorun and other functions aimed at making device use more ubiquitous that made this particular attack vector easy. I spent a lot of time working