One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers.
Johannes ObermaierMarc SchinkKosma MoczekPublished in: CoRR (2020)
Keyphrases
- access control
- information security
- hardware and software
- security requirements
- statistical databases
- security policies
- association rules
- security problems
- security level
- computer security
- network security
- security issues
- intrusion detection
- security systems
- rule sets
- security mechanisms
- e government
- databases
- active databases
- human operators
- rule learning
- key management
- data security
- security management