Malicious software installation

Demonstration as a part of the paper “Shattered Trust: When Replacement Smartphone Components Attack“ More information:
Back to Top