Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Comparison Logic is Vulnerable to Power Side-Channel Attacks

A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the reference token.