CySec

12345678910
Across
  1. 5. Attack exploiting built-in processors in hardware to execute malicious code
  2. 6. Preferred framework for IP level security analysis
  3. 7. Attack technique doesn't physically alter the chip but changes behavior through environmental stress
  4. 8. Security impact leading to loss of core vehicle function
  5. 9. Speculative execution attack targeting x86-64 processors
  6. 10. Security Property most impacted by Denial of Service attack
Down
  1. 1. Attack that adds hidden functionality during chip design
  2. 2. Measurement setup often used in side-channel analysis
  3. 3. Security Property ensuring information is accessible to only authorized agents
  4. 4. Hardware protection that can be bypassed by repeatedly accessing memory