Over the past decade (hardware) piracy has significantly evolved. In the past, attackers could perform analysis with simple methods for injecting transient faults, such as electrical glitching. More recently, such forms of analysis have been obsoleted by advanced analysis techniques that utilize capital-intensive failure analysis equipment and require extensive technical skills. One such technique, laser glitching, has recently been included into Common Criteria evaluations. The transient faults produced by laser glitching are similar in nature to electrical glitching.
- Lightweight Countermeasures Preventing Against Linear Code Extraction Attacks on a RISC-V
- Practical Invasive Attacks, How Hardware is Hacked For Compatible Product Creation by Thomas Olivier
- Report – Counterfeit, Clones and Genuine Printer Cartridges – HP
- Texplained’s Expertise Serving Europe fights against crime and terrorism
- Silicium on the Inside