If you bother to read more than the abstract, you’d realize this isn’t an attack. It’s a framework for possibly creating new attacks, which after extensive research yielded precisely zero code execution bugs. Gotta print something after wasting a whole semester I suppose.
When I say unsubstantiated rumor, this is what I’m talking about.
I'm curious about what you think they "tried and failed", and what exactly success looks like for you.
You mentioned "code execution bugs" - what is that exactly to you? I presume you don't count HID emulation, so I'd be interested in what exactly does count.
Code refers to computer code, sometimes called “shell code”. Execution refers to getting that code to run.
They didn’t get anything unexpected to happen on the device. You really should read the paper, it’s a masterclass in making nothing sound like something.
When I say unsubstantiated rumor, this is what I’m talking about.