One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers.
Johannes ObermaierMarc SchinkKosma MoczekPublished in: WOOT @ USENIX Security Symposium (2020)
Keyphrases
- access control
- information security
- rule induction
- security measures
- security threats
- security problems
- association rules
- statistical databases
- network security
- hardware and software
- security systems
- intrusion detection
- security issues
- security requirements
- rule sets
- security management
- information assurance
- biometric systems
- active databases
- security mechanisms
- computer security
- electronic commerce