Login / Signup
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers.
Vincent Werner
Laurent Maingault
Marie-Laure Potet
Published in:
J. Cryptogr. Eng. (2023)
Keyphrases
</>
end to end
fault injection
congestion control
admission control
ad hoc networks
multipath
fault model
transport layer
information security
java card
real world
internet protocol