In [5], the author discusses some
widely-used peripherals that can lead to various security
dangers. Finally, worst of all, a new kind of attack has
emerged: the hardware-based attack to software, which is
directly launched by a malicious hardware device.