Template Attack
Subtype of side-channel attack that uses two identical products, one known and one unknown, to perform pattern recognition between the two and thus retrieve data from the unknown product
To help you find your way through all the technical terms used in our business
Subtype of side-channel attack that uses two identical products, one known and one unknown, to perform pattern recognition between the two and thus retrieve data from the unknown product
Principle of the Trojan horse, it can be hardware or software. A trojan allows you to obtain information about what is going on in the system or to modify its operation.
Non-deterministic random number generator based on a full hardware solution.
A secure area inside a main processor. It runs in parallel of the operating system, in an isolated environment. It guarantees that the code and data loaded in the TEE are protected with respect to confidentiality and integrity.
A secure microcontroller with cryptographic features that provides a root of trust and enables the secure generation of keys and the ability to limit the use of them standardized by the Trusted Computing Group.
Vehicular communication system that will allow vehicles to exchange information with each other, with the infrastructure and with pedestrians
Communication model that allows vehicles to share information with the components that support a country's highway system. Such components include overhead RFID readers and cameras, traffic lights, lane markers, streetlights, signage and parking meters.
Communication between vehicles. Wireless network where automobiles send messages to each other with information about what they are doing. This data would include speed, location, direction of travel, braking, and loss of stability.