Research Article

Electronic User Authentication Key for Access to HMI/SCADA via Unsecured Internet Networks

Figure 10

An attempt to hack the firmware of the electronic key. (a) A fragment of the firmware in hex. (b) Disassembling the firmware fragment.
(a)
(b)