Naziv |
Hardware Fault Injection |
---|---|
Sažetak | The adversary uses disruptive signals or events (e.g. electromagnetic pulses, laser pulses, clock glitches, etc.) to cause faulty behavior in electronic devices. When performed in a controlled manner on devices performing cryptographic operations, this faulty behavior can be exploited to derive secret key information. |
Preduvjeti | Physical access to the system|The adversary must be cognizant of where fault injection vulnerabilities exist in the system in order to leverage them for exploitation. |
Rješenja | Implement robust physical security countermeasures and monitoring. |