These are attacks on hardware systems that involve pushing chips past their physical limitations, just enough to change the behavior of the chip without breaking it.
Fault injection is a very Black Box, we dont exactly know what we are changing, so we rely on Brute Force.
These are also attacks that quite frequently require modifications of the original hardware, or require connection of a external circuit to carry through with an attack.
Uses
- Fault Injection Clock Signal Glitching
- Firmware Reverse Engineering
- RCE
- OTP Overwritting
- Secure Boot bypass
- Code Readout Protection bypass
- Encrypted Flash bypass
- Setting up JTAG/SWD support
Glitching Device Implementations
Circuit Characterization Techniques
These are techniques to help us determine the Circuit Trace of a circuit.
Triggering Techniques
These are techniques to help us find Triggers for when to glitch the circuit.
Resources
- https://www.hextree.io
- The Art of Fault Injection ($4000+)