Monday, June 23, 2008

Attacks on and Countermeasures for USB Hardware Token Devices

Attacks on and Countermeasures for USB Hardware Token Devices

This paper documents investigations into the mechanical, electrical, andwww.ewalkins.com
software design of multiple vendors' USB hardware tokens (Figure 1). The
main focus of the analysis is to access a legitimate user's private data on the
key without having the proper credentials.www.ewalkins.com

Click Here To View Full Details


No comments: