a |
attack tree | Attack-tree-based Threat Modeling of Medical Implants |
b |
bug attacks | A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults |
d |
design-time analysis | Towards Efficient and Automated Side Channel Evaluations at Design Time |
e |
emergency access | Attack-tree-based Threat Modeling of Medical Implants |
f |
Fault attacks and defenses | Detection and Correction of Malicious and Natural Faults in Cryptographic Modules |
g |
gradient descent algorithm | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms |
h |
hardware performance counters | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms |
hardware simulation | Towards Efficient and Automated Side Channel Evaluations at Design Time |
Hardware Trojans | A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults |
i |
IMD | Attack-tree-based Threat Modeling of Medical Implants |
Implantable medical device | Attack-tree-based Threat Modeling of Medical Implants |
m |
malware analysis | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms |
o |
On-chip monitoring of physical attacks | Detection and Correction of Malicious and Natural Faults in Cryptographic Modules |
p |
path delay faults | A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults |
public key cryptographic hardware | A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults |
s |
security protocol | Attack-tree-based Threat Modeling of Medical Implants |
side channels | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms |
side-channel analysis | Towards Efficient and Automated Side Channel Evaluations at Design Time |
Standard Cell Design | Towards Efficient and Automated Side Channel Evaluations at Design Time |
Synergies between security and reliability | Detection and Correction of Malicious and Natural Faults in Cryptographic Modules |
t |
threat model | Attack-tree-based Threat Modeling of Medical Implants |