Presenter: Mari Seeba Loading… Taking too long? Reload document | Open in new tab previousSecurity in Automated Manufacturing: A Function-Driven ApproachnextLessons learned from blackbox analyses of software and hardware cryptographic implementations