Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator.
Junichi SakamotoShungo HayashiDaisuke FujimotoTsutomu MatsumotoPublished in: Clust. Comput. (2022)
Keyphrases
- countermeasures
- information security
- java card
- power analysis
- computer software
- rural areas
- security risks
- cyber attacks
- differential power analysis
- security breaches
- fault injection
- source code
- simulation environment
- fault diagnosis
- security measures
- software development
- software quality
- instructor led
- attack graphs
- database