Achievable defenses to interrupt this attack, which can be implemented to improve the security volume of the program, are indicated by eco-friendly circles. Also, the width from the strains concerning the attack steps and defenses suggests the probability in the attack path. Right here, the lines are of equivalent width https://ieeexplore.ieee.org/document/9941250