Detection of vulnerabilities and assessment of resistance to hacker attacks of smart cards and cryptoprocessors with built-in protection
Over the past decade, in addition to methods for extracting secrets or performing other unauthorized actions, attackers have begun to use unintentional data leakage and manipulation of program execution through side channels. Traditional attack methods can be expensive in terms of knowledge, time and processing power. Side-channel attacks, on the other hand, can be more easily implemented and non-destructive, […]