User Tools

Site Tools


Non-invasive attacks

Violating design assumptions

Many systems have expectations that a piece of hardware will complete an operation in so long. For example, hardware may assume that an ADC will always complete within 100 ms. If evens are generated at 200 ms this normally might not be a problem. However, if one can find a way to stall the external hardware internal queues may overflow and result in unexpected states that can leak data or other vulnerabilities.


semi-invasive.txt · Last modified: 2015/04/16 13:46 by mcmaster-guest