LCE Instruction flow modification (through micro-probing)
Description
LCE Instruction flow modification (through micro-probing)CWE
CVE
Attack Surfaces
Attack Vectors
FA (MITRE EMB3D TID-105)
Communication Tampering
Reverse Engineering
Defenses
Non-volatile memories should not be extractable through micro-probing attacks, Dedicated countermeasures such as the one created by Texplained and the CEA/ENSM (paper has been published at HOST_23)., Countermeasures are activity monitors that detect the LCE-modified instruction flow.