These are attacks on hardware systems that involve pushing chips past their physical limitations, just enough to change the behavior of the chip without breaking it.

Fault injection is a very Black Box, we dont exactly know what we are changing, so we rely on Brute Force.

These are also attacks that quite frequently require modifications of the original hardware, or require connection of a external circuit to carry through with an attack.

Uses

Glitching Device Implementations

Circuit Characterization Techniques

These are techniques to help us determine the Circuit Trace of a circuit.

Triggering Techniques

These are techniques to help us find Triggers for when to glitch the circuit.

  • Trigger right after UART, SPI, USB initialization

Resources