diff --git a/python/ql/src/experimental/Security/CWE-208/TimingAttack.qhelp b/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstSensitiveInfo.qhelp similarity index 91% rename from python/ql/src/experimental/Security/CWE-208/TimingAttack.qhelp rename to python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstSensitiveInfo.qhelp index f684894a8ce..683af727470 100644 --- a/python/ql/src/experimental/Security/CWE-208/TimingAttack.qhelp +++ b/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstSensitiveInfo.qhelp @@ -29,12 +29,12 @@ and does not depend on the contents of the arrays.
The following example uses == which is a fail fast check for validating a secret.
The next example use a safe constant-time algorithm for validating a secret:
-