semi-invasive
This is an old revision of the document!
Table of Contents
Non-invasive attacks
Violating design assumptions
Many systems have expectations that a piece of hardware will complete an operation in so long. For example, hardware may assume that an ADC will always complete within 100 ms. If evens are generated at 200 ms this normally might not be a problem. However, if one can find a way to stall the external hardware internal queues may overflow and result in unexpected states that can leak data or other vulnerabilities.
References
semi-invasive.1429206403.txt.gz · Last modified: 2015/04/16 17:46 by mcmaster-guest