You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Possible Countermeasures:
Mobile App Developer
The rigid use of sensors for voltage, frequency and temperature is the most common strategy against power glitching attacks.
Software and application countermeasures implemented to detect and recover from fault injection
Checking the flow decisions and cryptographic results carry out the fault detection
STA-37
Add Exploit Example, CVE Example and Countermeasures.
Exploit Example:
- Implementing Practical Electrical Glitching Attacks
CVE Example:
- CVE-2020-35553
Possible Countermeasures:
Mobile App Developer
The rigid use of sensors for voltage, frequency and temperature is the most common strategy against power glitching attacks.
Software and application countermeasures implemented to detect and recover from fault injection
Checking the flow decisions and cryptographic results carry out the fault detection
References:
- Brett Giller, "Implementing Practical Electrical Glitching Attacks", PowerPoint, Nov 2015, https://www.blackhat.com/docs/eu-15/materials/eu-15-Giller-Implementing-Electrical-Glitching-Attacks.pdf
The text was updated successfully, but these errors were encountered: