From space rays to laser beams: Fault injection in practice
Jasper van Woudenberg
Fault injection attacks are moving into the realm of embedded systems: secure memory 'readers' that use glitching to bypass security mechanisms are commercially available, and more recently Xbox 360 code security was broken by glitching the processor's reset line. Fault injection attacks aim to change the behavior of a device; e.g. to bypass authentication or extract secret information. We explain the fundamentals of fault injection, covering their history, the tools used for their execution, Differential Fault Analysis and other attacks that we execute in practice.