Program description
In this program, you will learn:
- Ability to find software and hardware design patterns …
In this program, you will learn:
- Ability to find software and hardware design patterns that may expose secrets via transient execution.
- Understand risks associated with transient-execution attacks and how these can be mitigated.
- How hardware faults can be used in attacks.
- How fault attacks on modern computers can be mitigated.