Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks

Publication
Proceedings of the Conference on Design, Automation & Test in Europe
Date