Computer Science
Hardware
100%
Attack
91%
Embedded Device
60%
State Machine
60%
Message Authentication Code
60%
Use Case
60%
Finite-State Machine
60%
Control Flow
60%
Software
60%
Memory Access
60%
Channel Attack
60%
Protection Mechanism
39%
Evaluation
39%
Unauthorized Access
30%
Microarchitecture
30%
Execution Environments
30%
Physical Memory
30%
Countermeasures
30%
Performance Issue
30%
Computing
30%
Cloud Application
30%
Shared Memories
30%
Liveness
30%
Error-correcting codes
30%
Block Cipher
30%
Benchmark
30%
Hardware Support
30%
Page Table Entry
20%
Kernel Extension
20%
Collision Probability
20%
Hardware Assistance
20%
Production Code
20%
Single Bit Error
15%
Heap Memory
12%
Fault Injection
8%
Protection
8%
Majority Voting
8%
Attack Scenario
8%
User Interaction
8%
Synthesis Tool
8%
Integrated Circuits
8%
Detection
8%
Building-Blocks
8%
Defense Strategy
8%
Open Source
8%
Core Processor
7%
Runtime Library
7%
Protection Scheme
7%