Page 283 - AWSAR 2.0
P. 283

side-channel. We also provide the designer with the set of options that could reduce the information leakage. The designer can pick and choose an option from the set to efficiently fix the vulnerability.
Conclusion
In today’s information age, it is highly imperative that we protect our personal devices. As more and more people demand
Mr. Patanjali S.L.P.S.K. || 259
secure and reliable devices that can use for they daily tasks, the problem of quantifying security of digital devices becomes important. We hope that the solutions proposed in our work will help people in the future to answer the question
“ Given two phones, which one is better in terms of security ?”
   




























































































   281   282   283   284   285