• Empirically chosen and implemented 3 attacks and analyzed the strength 
  • It works fine with authentication and remote attestation