Software countermeasures to physical fault injection lack definition and testing.
Lots of designers are unsure of software countermeasures for protection from fault injection, and unsure of which countermeasures to implement and how to implement them. With some tests we can discover which countermeasures work in which instances.
Software countermeasures for fault injection are programming paradigms and strategies designed to counter physical fault injection. It is exponentially harder to time consecutive faults on the same program, with this knowledge we can create a fault model and simulate countermeasures as if it were the real world. After collecting information on as many strategies as possible, defining tests, and simulating every possible fault injection, we can not only see that software countermeasures for fault injection are valid, but that in most cases can severely reduce possible faults.
In this talk any hardware designer or firmware programmer will take away applicable knowledge of how to prevent a large amount of fault injection attacks with only software.
Josh Beaker is a security analyst at Riscure North America and has been in industry for less than a year. He gets to research topics like fault injection, and likes long walks on the beach.