Attack: Function (Call) sequence can be modified by an untrusted attacker.
Solution: hash chain built by trusted functions, which can be verified by the user.
Not a very interesting paper.
Attack: Function (Call) sequence can be modified by an untrusted attacker.
Solution: hash chain built by trusted functions, which can be verified by the user.
Not a very interesting paper.