Research Article
Electronic User Authentication Key for Access to HMI/SCADA via Unsecured Internet Networks
Figure 10
An attempt to hack the firmware of the electronic key. (a) A fragment of the firmware in hex. (b) Disassembling the firmware fragment.
(a) |
(b) |