This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weak security functions in embedded systems.

 
  • 本文概观了各种攻击技术,并阐述了它们是怎样削弱嵌入式系统的安全功能。
今日热词
目录 附录 查词历史