In this Meetup Thomas Kerbl will introduce you to Security Design Principles and how to apply them in your own projects! Abstract A resilient architecture acts as a strong foundation for secure applications. Designing such an architecture can be challenging, if you’re not relying… Read More
Join the 4th edition of our Key Researcher Talk Series! Combinatorial Testing Methods and Algorithms for Detecting and Locating Cryptographic Trojans Combinatorial methods have attracted attention as a means of providing strong assurance at reduced cost, but are these methods practical and cost-effective, in the case of malicious hardware logic… Read More
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.