28
Dec
2014
Transforming USB Malware Into Snitches
Years ago I became deeply interested in trojans that were deployed to USB devices. At the time there were a number of vulnerabilities such as autorun and other functions aimed at making device use more ubiquitous that made this particular attack vector easy. I spent a lot of time working