Computer Science
Hardware
100%
Attack
91%
State Machine
60%
Encryption
60%
Finite-State Machine
60%
Control Flow
60%
Commodity Hardware
60%
Use Case
60%
Channel Attack
60%
Software
60%
Code Encryption
60%
Message Authentication Code
60%
Embedded Device
60%
Memory Access
60%
Protection Mechanism
39%
Evaluation
39%
Security Analyst
30%
Physical Memory
30%
Block Cipher
30%
Execution Environments
30%
Metadata
30%
Performance Issue
30%
Benchmark
30%
Computing
30%
Cloud Application
30%
Unauthorized Access
30%
Shared Memories
30%
Liveness
30%
Error-correcting codes
30%
Microarchitecture
30%
Countermeasures
30%
Hardware Support
30%
Protection
28%
Security Mechanism
20%
Computation Step
20%
Reasoning
20%
Analysis Framework
20%
Security Challenge
20%
Physical Protection
20%
Virtual Memory
20%
Page Table Entry
20%
Kernel Extension
20%
Collision Probability
20%
Production Code
20%
Hardware Assistance
20%
Call Graph
18%
Single Bit Error
15%
Hashing Function
15%
Heap Memory
12%
Data Confidentiality
12%