USB-based attacks
Attackers increasingly take advantage of innocent users who tend to use USB peripherals
casually, assuming these peripherals are benign when in fact they may carry an embedded …
casually, assuming these peripherals are benign when in fact they may carry an embedded …
User interface system, method, and computer program product
MS Smith - US Patent 9,417,754, 2016 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
Clinical computer security for victims of intimate partner violence
Digital insecurity in the face of targeted, persistent attacks increasingly leaves victims in
debilitating or even life-threatening situations. We propose an approach to hel** victims …
debilitating or even life-threatening situations. We propose an approach to hel** victims …
Multiple class memory systems
MS Smith - US Patent 8,930,647, 2015 - Google Patents
US8930647B1 - Multiple class memory systems - Google Patents US8930647B1 - Multiple class
memory systems - Google Patents Multiple class memory systems Download PDF Info …
memory systems - Google Patents Multiple class memory systems Download PDF Info …
Firmusb: Vetting usb device firmware using domain informed symbolic execution
The USB protocol has become ubiquitous, supporting devices from high-powered
computing devices to small embedded devices and control systems. USB's greatest feature …
computing devices to small embedded devices and control systems. USB's greatest feature …
On the (in) security of mobile two-factor authentication
Abstract Two-factor authentication (2FA) schemes aim at strengthening the security of login
password-based authentication by deploying secondary authentication tokens. In this …
password-based authentication by deploying secondary authentication tokens. In this …
Defending against malicious USB firmware with GoodUSB
USB attacks are becoming more sophisticated. Rather than using USB devices solely as a
delivery mechanism for host-side exploits, attackers are targeting the USB stack itself …
delivery mechanism for host-side exploits, attackers are targeting the USB stack itself …
Devices, methods, and graphical user interfaces for manipulating user interface objects with visual and/or haptic feedback
MS Smith - US Patent 10,275,087, 2019 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
Exfiltrating data from android devices
Q Do, B Martini, KKR Choo - Computers & Security, 2015 - Elsevier
Modern mobile devices have security capabilities built into the native operating system,
which are generally designed to ensure the security of personal or corporate data stored on …
which are generally designed to ensure the security of personal or corporate data stored on …
Devices, methods, and graphical user interfaces for manipulating user interface objects with visual and/or haptic feedback
MS Smith - US Patent 10,386,960, 2019 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …