Login / Signup
TPM-FAIL: TPM meets Timing and Lattice Attacks.
Daniel Moghimi
Berk Sunar
Thomas Eisenbarth
Nadia Heninger
Published in:
CoRR (2019)
Keyphrases
</>
trusted platform module
computing platform
trusted computing
countermeasures
data sets
distributed computing
security mechanisms
computer security
security threats
traffic analysis
malicious attacks