Bypassing Secure Boot using Fault Injection (SHA2017)

Bypassing Secure Boot using Fault Injection More and more (secure) embedded systems implement a feature to assure the integrity and confidentialit...
Back to Top