Login / Signup
When Firmware Modifications Attack: A Case Study of Embedded Exploitation.
Ang Cui
Michael Costello
Salvatore J. Stolfo
Published in:
NDSS (2013)
Keyphrases
</>
countermeasures
case study
operating system
power consumption
embedded systems
neural network
artificial intelligence
computer systems
watermarking algorithm
database systems
lightweight
secret key
malicious users