Login / Signup
Is your secure test infrastructure secure enough? : Attacks based on delay test patterns using transient behavior analysis.
Sergej Meschkov
Dennis R. E. Gnad
Jonas Krautter
Mehdi B. Tahoori
Published in:
ITC (2021)
Keyphrases
</>
behavior analysis
security requirements
security mechanisms
security protocols
preprocessing
object detection
steady state
key management
chosen plaintext