However, these countermeasures are expensive and cumbersome, the researchers confessed.
The manner in which hardware processes data has always exposed some vulnerabilities, he said.
are reasonable…thats just good, secure design.
The attacks are nonetheless real and can be carried out, said Nunnikhoven.
source: www.techworm.net