ABSTRACT

Several types of faults may occur in a cryptographic device, leading to the vulnerability of the cipher being used. In the data fault model, the attacker flips some bits in RAM or internal registers. In the flow fault model, the attacker makes small changes in the flow of execution, such as skipping an instruction, changing a memory address etc.