Fault Injection Attack on FLASH Erasure Process

Fault Injection Attack on FLASH Erasure Process

Comprehensive Analysis of Chip Debug Interface Protection Mechanisms Author | Liu Zheng Editor | Liu Mengdi 1. Background Introduction Microcontrollers are the backbone of the modern interconnected world, with widespread applications in robotics, medical devices, aerospace, and automotive industries. With the development of the Internet of Things (IoT), microcontrollers have become even more prevalent in … Read more

Reliability Testing Based on Fault Injection Technology

Reliability Testing Based on Fault Injection Technology

Abstract: This article proposes a testing technology path aimed at design mechanisms for comprehensive verification of faults. By adopting the concept of comprehensive verification, we distill an integrated verification principle and implementation requirements based on fault injection methods. The article also presents implementation principles, processes, verification evaluation methods, and key technological connotations for application trade-offs, … Read more

Chapter 4: Fault Injection Attack Techniques

Chapter 4: Fault Injection Attack Techniques

Click the blue text Follow Us Introduction Current hardware security research has gone beyond the scope of “standalone cryptographic chips.” We need to examine hardware security from the perspective of open systems. Traditional hardware security mainly protects keys, while new security must protect not only keys but also software. OSR has launched the “Fundamentals of … Read more

Constructing an Oscilloscope with Fault Injection: Simple/Related Fault Attacks on Cryptographic Algorithms

Constructing an Oscilloscope with Fault Injection: Simple/Related Fault Attacks on Cryptographic Algorithms

Is there an inherent connection between passive side-channel analysis and active fault injection? Author | Shuyuan Editor | Pan Qizhi Background Introduction Side-channel analysis of cryptographic algorithms refers to the process of inferring intermediate values of cryptographic operations by collecting and analyzing the physical information leaked by cryptographic chips during computation, thereby recovering the keys. … Read more

TÜV Nord Functional Safety Discussion: Software Fault Injection Method (Part 1)

TÜV Nord Functional Safety Discussion: Software Fault Injection Method (Part 1)

On the 26th of Every Month TÜV Nord Industrial Services Functional Safety Discussion Software Fault Injection Method (Part 1) Abstract Software fault injection is an important technical means for functional safety verification. This article aims to provide a basic overview of software fault injection and introduce existing fault injection techniques. 01 Introduction to Fault Injection … Read more

Understanding Fault Injection and Signal Conditioning in HIL

Understanding Fault Injection and Signal Conditioning in HIL

“Fault injection” is a concept often heard in the HIL community. What exactly is it? Where did it come from? What is its historical background? What does the future hold for it? Let’s start by casually looking for a couple of advertisement images online: And there’s this one: It’s a bit convoluted and not very … Read more

Safety Assessment of Automated Driving Functions: Simulation-Based Fault Injection

Safety Assessment of Automated Driving Functions: Simulation-Based Fault Injection

This article is translated from the “2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES)” Included paper “Safety Assessment of Automated Vehicle Functions by Simulation-based Fault Injection” Original authors: Garazi Juez, Estibaliz Amparan Editor’s Note: When analyzing the concept phase of automotive functional safety based on the existing version of ISO 26262, theoretical methods … Read more

Password Cracking and Protection Techniques Based on Persistent Fault Injection

Password Cracking and Protection Techniques Based on Persistent Fault Injection

Project Name: Password Cracking and Protection Techniques Based on Persistent Fault Injection Submitting Unit: School of Information and Electronic Engineering, Cyber Security Center Responsible Person: Zhang Fan 01 Project Overview Research Background: In today’s severe international competition for chips, as China strives to promote chip autonomy and controllability, chip security has become particularly important. Ultimately, … Read more

Simulation and Fault Injection Testing of DC Charging for Electric Vehicles

Simulation and Fault Injection Testing of DC Charging for Electric Vehicles

The charging system is an important foundational support system for new energy vehicles and is a key condition for the industrialization and popularization of new energy vehicles, significantly impacting its industrial development. Currently, the charging modes are divided into AC and DC. New energy vehicles that support AC mode are equipped with on-board AC-DC converters … Read more

Method for Continuous Fault Injection in Multi-Failure Scenarios

Method for Continuous Fault Injection in Multi-Failure Scenarios

Exploring New Scenarios for Continuous Fault Attacks Written by | Lu Zeyuan Edited by | Liu Mengdi Background Introduction In 2018, Zhang Fan and others from Zhejiang University attacked a cryptographic system running the AES algorithm based on statistical ideas, termed Persistent Fault Analysis (PFA)[1]. This paper first introduced the concept of continuous faults. Compared … Read more