On Sat, Jan 22, 2005 at 09:36:28PM +, Lilliput wrote:
> Then my second question was about the USB stack integrity (no specific
> to a linux platform) Do you think that devices could create an overflow
> in order to take control/install a software in the computer ?
Yes, this could easily happe
> Then my second question was about the USB stack integrity (no specific
> to a linux platform) Do you think that devices could create an overflow
> in order to take control/install a software in the computer ?
In terms of DMAing to buffers, the only device you have to trust to play nice
is your
Hello all ;)
I writing a research paper for the University of Bradford (UK).
I'm looking for some security issue, through different type of
communication in the USB protocoles.
The first one is USB sniffing; software and hardware.
* snoopy in windows
* hardware http://www.elli
Greg:
This patch fixes a number of small errors in the routines that handle
messages for root hubs:
Fill in the extra byte if a string descriptor transfer
asks for an odd number of bytes.
Don't copy more than urb->transfer_buffer_length bytes.
Use an extra intern
On Thu, 20 Jan 2005 22:28:31 -0800, David Brownell <[EMAIL PROTECTED]> wrote:
> By the way ... on the topic of usbmon rather than changing
> usbcore, is there a brief writeup of what you want this
> new version to be doing -- and how? Like, why put the
> spy hooks in that location, rather than an