Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Improper Management of Sensitive Trace Data

Trace data collected from several sources on then System-on-Chip (SoC) is stored in unprotected locations orn transported to untrusted agents.