Computer Science
Advanced Encryption Standard
100%
Mobile Platform
100%
Secret Information
100%
deduplication
100%
Detection Mechanism
100%
Processor Design
100%
side-channel
100%
Memory Management
66%
Physical Memory
66%
Autonomous Device
50%
Automated Attack
50%
Powerful Source
50%
Data Access
50%
Performance Counter
50%
linux system
50%
Information System
50%
Constant Cache
50%
Attack Technique
50%
Benign Application
50%
Instruction Execution
50%
Hardware Performance
50%
Power Requirement
50%
Remote Attacker
33%
Memory Location
33%
Interrupt Handler
33%
Internet
33%
Exploitation Technique
33%
Underlying Hardware
33%
Software Vulnerability
33%
Malicious Actor
33%
Memory Allocator
33%
Scripting Languages
33%
Mitigation Strategy
33%
Browser Extension
33%
Connecting User
33%
Cache Organization
33%
Physical Page
33%
Private Environment
33%
Javascript Code
33%
Hijacking Attack
33%
Unprivileged User
33%
Code Injection Attack
33%
Hardware Support
33%
Modern Operating System
33%
Code Reuse
33%
Virtual Machine
33%
Categorization System
25%
Digital Circuit
23%
Hardware Design
16%
Physical Attack
16%
Power Analysis
16%
Protection Level
14%
Protected System
14%
Software Developer
14%
Attack Strategy
12%