Cited By
View all- Bossard A(2024)An Optimised PIC Programmer Also Having a High Pedagogical ValueComputer and Communication Engineering10.1007/978-3-031-71079-7_13(158-170)Online publication date: 23-Oct-2024
The most common application for side-channel attacks is the extraction of secret information, such as key material, from the implementation of a cryptographic algorithm. However, using side-channel information, we can extract other types of ...
Modern embedded computing devices are vulnerable against malware and software piracy due to insufficient security scrutiny and the complications of continuous patching. To detect malicious activity as well as protecting the integrity of executable ...
Association for Computing Machinery
New York, NY, United States
View or Download as a PDF file.
PDFView online with eReader.
eReaderView this article in digital edition.
Digital EditionView this article on the magazine site (external)
Magazine SiteCheck if you have access through your login credentials or your institution to get full access on this article.
Sign in