Across
- 5. Attack exploiting built-in processors in hardware to execute malicious code
- 6. Preferred framework for IP level security analysis
- 7. Attack technique doesn't physically alter the chip but changes behavior through environmental stress
- 8. Security impact leading to loss of core vehicle function
- 9. Speculative execution attack targeting x86-64 processors
- 10. Security Property most impacted by Denial of Service attack
Down
- 1. Attack that adds hidden functionality during chip design
- 2. Measurement setup often used in side-channel analysis
- 3. Security Property ensuring information is accessible to only authorized agents
- 4. Hardware protection that can be bypassed by repeatedly accessing memory
