Linked Presentation: The Impostor Among US(B): Off-Path Injection Attacks on USB CommunicationsChecking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect ProtocolBunnyHop: Exploiting the Instruction PrefetcherHot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs