CWE-1255 – Comparison Logic is Vulnerable to Power Side-Channel Attacks
Description A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value...
Description A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value...