Login / Signup
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion.
Nikolay Ivanov
Qiben Yan
Published in:
CNS (2021)
Keyphrases
</>
countermeasures
real time
hardware and software
hardware designs
low cost
hardware implementation
neural network
computer systems
model checking
personal computer
massively parallel
face verification
computing power
hardware architecture