Capturing and Obscuring Ping Pong Patterns to Mitigate Continuous Attacks

Publication
Proceedings of the Conference on Design, Automation & Test in Europe
Date