Skip to main content
. 2017 Feb 25;17(3):464. doi: 10.3390/s17030464

Figure 9.

Figure 9

Pixel-based timing probing attack. (a) Real-time function call and element access chart; (b) behavior log (attack pattern is highlighted).