13 No Kiddin’: Real-Life Examples
You’ve learned about embedded systems, and you’ve learned about embedded attacks. You might still feel like the hands-on attack details for real systems is missing. This chapter will help bridge the gap between laboratory examples and real life, and we’ll provide examples of both fault injection and power analysis attacks.
Fault Injection Attacks
Fault injection attacks have probably been used the most in (published) real-world attacks of products (compared to power analysis). Two high-profile examples you might have heard about are attacking the Sony PlayStation’s hypervisor and the Xbox 360 via the “reset ...
Get The Hardware Hacking Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.