Half-Blind Attacks: Mask ROM Bootloaders are Dangerous.
Travis GoodspeedAurélien FrancillonPublished in: WOOT (2009)
Keyphrases
- countermeasures
- malicious users
- traffic analysis
- attack detection
- digital image watermarking scheme
- computer security
- data sets
- watermark extraction
- watermarking scheme
- security threats
- denial of service attacks
- malicious attacks
- watermarking method
- digital image watermarking
- terrorist attacks
- security risks
- security protocols
- information security
- cooperative