USB-based attacks

N Nissim, R Yahalom, Y Elovici - Computers & Security, 2017 - Elsevier
Attackers increasingly take advantage of innocent users who tend to use USB peripherals
casually, assuming these peripherals are benign when in fact they may carry an embedded …

User interface system, method, and computer program product

MS Smith - US Patent 9,417,754, 2016 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

Clinical computer security for victims of intimate partner violence

S Havron, D Freed, R Chatterjee, D McCoy… - 28th USENIX Security …, 2019 - usenix.org
Digital insecurity in the face of targeted, persistent attacks increasingly leaves victims in
debilitating or even life-threatening situations. We propose an approach to hel** victims …

Multiple class memory systems

MS Smith - US Patent 8,930,647, 2015 - Google Patents
US8930647B1 - Multiple class memory systems - Google Patents US8930647B1 - Multiple class
memory systems - Google Patents Multiple class memory systems Download PDF Info …

Firmusb: Vetting usb device firmware using domain informed symbolic execution

G Hernandez, F Fowze, D Tian, T Yavuz… - Proceedings of the 2017 …, 2017 - dl.acm.org
The USB protocol has become ubiquitous, supporting devices from high-powered
computing devices to small embedded devices and control systems. USB's greatest feature …

On the (in) security of mobile two-factor authentication

A Dmitrienko, C Liebchen, C Rossow… - … Conference on Financial …, 2014 - Springer
Abstract Two-factor authentication (2FA) schemes aim at strengthening the security of login
password-based authentication by deploying secondary authentication tokens. In this …

Defending against malicious USB firmware with GoodUSB

DJ Tian, A Bates, K Butler - Proceedings of the 31st Annual Computer …, 2015 - dl.acm.org
USB attacks are becoming more sophisticated. Rather than using USB devices solely as a
delivery mechanism for host-side exploits, attackers are targeting the USB stack itself …

Devices, methods, and graphical user interfaces for manipulating user interface objects with visual and/or haptic feedback

MS Smith - US Patent 10,275,087, 2019 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

Exfiltrating data from android devices

Q Do, B Martini, KKR Choo - Computers & Security, 2015 - Elsevier
Modern mobile devices have security capabilities built into the native operating system,
which are generally designed to ensure the security of personal or corporate data stored on …

Devices, methods, and graphical user interfaces for manipulating user interface objects with visual and/or haptic feedback

MS Smith - US Patent 10,386,960, 2019 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
56164181&utm_source= google_patent&utm_medium= platform_link&utm_campaign …