Login / Signup

Is your secure test infrastructure secure enough? : Attacks based on delay test patterns using transient behavior analysis.

Sergej MeschkovDennis R. E. GnadJonas KrautterMehdi B. Tahoori
Published in: ITC (2021)
Keyphrases
  • behavior analysis
  • security requirements
  • security mechanisms
  • security protocols
  • preprocessing
  • object detection
  • steady state
  • key management
  • chosen plaintext