Chat with us, powered by LiveChat

The protection of information and communications of complex infrastructures against unauthorized accesses threatening data integrity, confidentiality and availability is a buoyant field of research and commercial innovations which has grown and evolved significantly over the recent years because of the constant battle between those looking to improve security and those looking to circumvent it.
Among the security threats, implementation’s vulnerability (from devices to cyber-physical infrastructures) to Physical Attacks is one of the most important threatening a plethora of applications managing users’ authentication, data confidentiality and privacy.