malware can infect peripheral devices. Many embedded devices support firmware update
capabilities, yet they do not authenticate such updates; this allows adversaries to infect
peripherals with malicious firmware. We present a case study of the Logitech G600 mouse,
demonstrating attacks on networked systems which are also feasible against air-gapped
systems.