Exploiting smart-phone USB connectivity for fun and profit | Proceedings of the 26th Annual Computer Security Applications Conference By Zhaohui WangGeorge Mason University, Fairfax, VAView Profile Archived: 2026-04-05 14:05:02 UTC Wang CHsu F(2025)USBIPS frameworkComputer Standards & Interfaces10.1016/j.csi.2025.10404095:COnline publication date: 18-Dec-2025 Li WManickam SChong YHe YLi HLi B(2025)ByteBait USB: a robust simulation toolkit for badUSB phishing campaignJournal of King Saud University Computer and Information Sciences10.1007/s44443- 025-00067-637:5Online publication date: 1-Jul-2025 Zhang YDu FChi XLv Z(2024)USB Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom63139.2024.00182(1296-1303)Online publication date: 17-Dec-2024 Show More Cited By Source: http://dl.acm.org/citation.cfm?id=1920314 http://dl.acm.org/citation.cfm?id=1920314 Page 1 of 1