Primer on Embedded Side Channel Attacks
“Attack him where he is unprepared, appear where you are not expected.” Sun-Tzu, Art of War For much of the history of embedded systems, many product designers and engineers have had the luxury of building rather closed loop systems with little to no interaction with other systems. A so-called “security through obscurity” was perhaps not…
Read More