From 248bd2009929e944f5576dd0421a8244096a4a3c Mon Sep 17 00:00:00 2001 From: Koutheir Attouchi Date: Tue, 16 Jul 2024 09:56:30 -0400 Subject: [PATCH] Fix another link --- book.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/book.md b/book.md index a4fc8be..af76c02 100644 --- a/book.md +++ b/book.md @@ -2854,7 +2854,7 @@ For example: writing a crypto key to a crypto accelerator, forcing the key value written to be zero (caused to low voltage on bus hardware). -Example: Attack on TrustZone for Armv8-M: https://www.youtube.com/watch?v=4u6BAH8mEDw +Example: [Attack on TrustZone for Armv8-M](https://www.youtube.com/watch?v=4u6BAH8mEDw) There are other forms of physical attacks, but most of them requires significant effort or cost (e.g. cut open the chip package can carry out