Stealthy Information Leakage Through Peripheral Exploitation in Modern Embedded Systems | IEEE Journals & Magazine | IEEE Xplore