Buchanan walks through his process of experimenting with low-cost fault-injection attacks as an alternative when typical software bugs aren’t available to exploit.
That is impressive. However, if you have physical access to the RAM, you can probably also just pop in a live USB, chroot into the system and do whatever you want. Regardless, this injection was interesting and impressive. Hats off to a clever hacker like that.
cmnybo@discuss.tchncs.de 1 month ago
If you have physical access, then you have total access.
BrikoX@lemmy.zip 1 month ago
Not if the storage is encrypted. That’s why vulnerabilities in operating systems/kernel are so impactful, as they can bypass that encryption.
possiblylinux127@lemmy.zip 1 month ago
Well no, if the device is powered off you need to brute force the encryption which will take a very long time.
However, if the device is booted you can just read from ram.