SlideShare a Scribd company logo
1 of 36
Download to read offline
Fault	Injection	Attacks
on	embedded	systems
Ziyad	Alshehri
IA	5984
Fall	- 2017
Overview
• Fault	injection	techniques
• Clock	Glitching
• Timing	the	attack
• Setup	for	Clock	Glitching
• Advanced	Clock	Glitching
• Voltage	Glitching
• Setup	for	Voltage	Glitching
• Defenses	against	fault	injection
• Contribution	to	Sprite	team
• Conclusion
Glitching	Attacks
• Introducing	faults	in	a	target	to	alter	its	intended	behavior
• The	goal	is	to	skip	instructions	or	corrupt	data	while	
read/write
• Real-life	Example:
• Xbox	360	Reset	Glitch	Hack	– by	a	French	hacker	GliGli,	2011
Clock	Glitching
• Since	the	instructions	are	executed	in	a	pipeline	based	on	the	rising	edge,	it’s	
possible	to	skip	an	instruction	by	reducing	the	execution	time.
Clock	Glitching
• To	build	a	Clock	Glitcher,	we	XOR	the	glitch	stream	with	the	original	clock:
• Then	we	remove	the	crystal	oscillator	and	use	the	new	clock.
Timing	the	attack
• In	order	to	precisely	attack	the	target,	we	have	to	
identify	a	trigger	signal	to	initiate	the	attack	based	
on.
• Status	LEDs
• Toggle	GPIO
• Serial	messages	(	UART	)
• Any	other	hardware	events	(	Reset,	… )
Setup	for	Clock	Glitching
• We	will	use	Chipwhisperer-Lite	for	this	attack
• Comprised	of	MCU	&	FPGA	(ATSAM3U2C	+	
SPARTAN-6)
CLK	out
Trigger	in
UART	for	output
Setup	for	ATMEGA1284PChipWhispere
r
CLK	OUT
Trigger	
in
UART	
output
ChipWhisperer	Software	
Configuration
External	
trigger	
offset
=	22%	of	50ns	=	11ns
=	14%	of	50ns	=	7ns
Glitch	
offset
Glitch	
Width
20MHz	freq =	Period	50ns
Results
Trigger
Target	instruction
Examples	of	Successful	Glitches
• Rolled	back	to	version	1	using	FPGA	trigger	(UART=‘U’)	to	skip	version	check,	and	then	printed	the	
flag.
River	Hawk	(Umass Lowell)
Target	instruction
Examples	of	Successful	Glitches
• Obtained	the	encryption	keys	by	glitching to	exit	the	while	loop,	and	then	installing	a	malicious	
firmware	to	print	the	keys	over	serial,	then	decrypted	v1	firmware.
• Forced	the	bootloader	to	print	out	memory	read	log	and	decrypt	it	using	the	keys	to	get	stored	flags.
Northeastern	ReadbackNortheastern	Upload
If	statement
Print	‘F’	=	0x46
Infinite	loop
wdt_reset()
Minimum	optimization	-O1
Optimized	!Optimized	!
Lesson	learned! Review	the	assembly	code
Advanced	Glitching
• Practical	Analysis	of	Embedded	Microcontrollers	
against	Clock	Glitching	Attacks - by	Ricardo	Gomes	da	
Silva,	17	March	2014	
Summary	of	the	paper:
• The	research	proposes	a	better	design	for	a	glitching
system,	and	compares	between	different	glitching
results	for	different	assembly	instructions.
• Also,	the	research	shows	how	glitching multiple	loops	is	
possible	with	the	appropriate	hardware configurations.
Glitcher Development
• Using	Die	Datenkrake,	Hardware	Security	Platform
• Comprised	of	ARM	MCU	&	FPGA
• Their	target	XMEGA-A1	Xplained
XMEGA-A1	Xplained
Glitcher Development
• Results	of	the	glitched clock:
• The	research	compares	between	
• Unconditional	loops	(Jump,	Relative	Jump)
• Conditional	loops	(Branch	if	equal,	Branch	if	not	equal)
• Multiple	loops
Unconditional	loops: Jump	(	JMP )
Explanation:
JMP	requires	3	CLK	cycles	to	be	
executed.	
Each	instruction	is	(16-bit)	long,	
and	the	new	address	is	(22-bit)	
long,	therefore,	we	need	2	cycles	
to	fit	the	new	address.	If	these	2	
cycles	were	glitched then	we	can	
bypass	the	instruction.
If	we	glitched both	
cycles,	we	won’t	
change	the	PC	value.
Unconditional	loops	– Relative	
Jump	(	RJMP )
Explanation:
RJMP	requires	2	CLK	cycles	to	
be	executed.	
RJMP	is	a	sum	of	the	current	
PC	+	offset	(12	bit)	+1	,	so	the	
first	cycle	will	conduct	the	
sum	operation	for	the	new	
address,	if	glitched,	then	we	
can	bypass	the	instruction.
Conditional	loops	– Branch	if	
equal	(	BREQ )
Explanation:
BREQ	changes	the	current	
flow	of	the	program	if	the	
compared	values	are	equal.	In	
other	words,	subtract	then	
branch	if	zero.
BREQ	requires	1	or	2	CLK	
cycles	to	be	executed.	The	first	
cycle,	will	compare	if	the	
result	is	zero	or	not	(0xFF),	
and	the	second	one	will	
execute	the	branch.
We	only	need	to	glitch	the	
first	cycle	to	bypass	the	
instruction.
Conditional	loops	–Branch	if	not	
equal	(BRNE)
Explanation:
BRNE	changes	the	current	flow	
of	the	program	if	the	compared	
values	are	not	equal.	In	other	
words,	subtract	then	branch	if	
not	zero.
BRNE	requires	1	or	2	CLK	cycles	
to	be	executed.	The	first	cycle,	
will	compare	if	the	result	is	not	
zero	(0xEE),	and	the	second	one	
will	execute	the	branch.
We	only	need	to	glitch	the	first	
cycle	to	bypass	the	instruction.
Multiple	loops	– (double	RJMP)
We	needed	to	use	the	internal	
trigger	to	add	a	precise	delay	
before	the	second	RJMP.
Multiple	loops	– (double	RJMP)
Explanation:
D0 and	W0 correspond	to	the	
delay	and	width	of	the	first	glitch,	
while	D1	and	W1	correspond	to	
the	delay	and	width	of	the	second	
glitch	(after	the	trigger).
They	were	able	to	glitch	multiple	
RJMPs	with	1-2	repeated	glitches
VCC	Glitching
Shunt	
resistor
Setup	for	Voltage	Glitching
Setup	for	ATMEGA1284P
ChipWhisperer
Glitch	OUT
Example	of	VCC	Glitching
Defenses	against	glitching attacks
• Using	different	clock	for	sensitive	operations	(	
Firmware	Dogs	)
Defenses	against	glitching attacks
• Enable	Brown-out-detection	against	vcc glitching
Defenses	against	glitching attacks
• Erase	the	flash/eeprom in	case	failure	(Firmware	Dogs,	
pgm_flag)
• Using	bl_configure function,	to	configure	only	once	(	
Firmware	Dogs	)
Firmware	Dogs:	Fill	the	buffer	with	FFs	and	rewrite pgm_flag:	Erase	SRAM,	then	erase	flash
Defenses	against	glitching attacks
• Disable	any	unnecessary	debug	info	(Snorlax)
Snorlax:	no	feedback	on	UART!
Contribution	to	Sprite	team
• Got	all	flags	from	RPI,	using	AVR	Dragon	and	High	
Voltage	Parallel	Programming	(HVPP)
• Hardening	the	hardware	configurations	(Lockbits)
Contribution	to	Sprite	team
• implementing	Clock	Glitching,	and	helped	getting	
all	flags	from	vulnerable	designs.
References
• Gomes,	Ricardo,	“Practical	Analysis	of	Embedded	Microcontrollers	against	Clock	Glitching	
Attacks”,	https://rgsilva.com/Bachelorarbeit.pdf
• Riscure:	https://www.riscure.com/documents/eu-16-timmers-bypassing-secure-boot-using-
fault-injection.pdf?1479193246
• NCC	Group:https://www.blackhat.com/docs/eu-15/materials/eu-15-Giller-Implementing-
Electrical-Glitching-Attacks.pdf
• Chipwhisperer:	https://wiki.newae.com
• Die	Datenkrake:	https://github.com/ddk
• AVR	XMEGA	datasheet:	http://www.atmel.com/images/doc8077.pdf
Thank	you

More Related Content

What's hot

Loc, los and loes at speed testing methodologies for automatic test pattern g...
Loc, los and loes at speed testing methodologies for automatic test pattern g...Loc, los and loes at speed testing methodologies for automatic test pattern g...
Loc, los and loes at speed testing methodologies for automatic test pattern g...eSAT Journals
 
Design and implementation of uart on soc
Design and implementation of uart on socDesign and implementation of uart on soc
Design and implementation of uart on socIjrdt Journal
 
XPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, Intel
XPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, IntelXPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, Intel
XPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, IntelThe Linux Foundation
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9Nil Menon
 
Wishbone interface and bus cycles
Wishbone interface and bus cyclesWishbone interface and bus cycles
Wishbone interface and bus cyclesdennis gookyi
 
Sequence detector Verilog Code
Sequence detector Verilog CodeSequence detector Verilog Code
Sequence detector Verilog CodeBharti Airtel Ltd.
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLSSam Bowne
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5Chaing Ravuth
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
ATPG Methods and Algorithms
ATPG Methods and AlgorithmsATPG Methods and Algorithms
ATPG Methods and AlgorithmsDeiptii Das
 
Combinational & Sequential ATPG.pdf
Combinational & Sequential ATPG.pdfCombinational & Sequential ATPG.pdf
Combinational & Sequential ATPG.pdfMoinPasha12
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacksStefan Fodor
 
4 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.024 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.02saeed_sh65
 

What's hot (20)

Loc, los and loes at speed testing methodologies for automatic test pattern g...
Loc, los and loes at speed testing methodologies for automatic test pattern g...Loc, los and loes at speed testing methodologies for automatic test pattern g...
Loc, los and loes at speed testing methodologies for automatic test pattern g...
 
Design and implementation of uart on soc
Design and implementation of uart on socDesign and implementation of uart on soc
Design and implementation of uart on soc
 
XPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, Intel
XPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, IntelXPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, Intel
XPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, Intel
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
 
Wishbone interface and bus cycles
Wishbone interface and bus cyclesWishbone interface and bus cycles
Wishbone interface and bus cycles
 
GSM Fundamentals
GSM FundamentalsGSM Fundamentals
GSM Fundamentals
 
Sequence detector Verilog Code
Sequence detector Verilog CodeSequence detector Verilog Code
Sequence detector Verilog Code
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLS
 
Burst clock controller
Burst clock controllerBurst clock controller
Burst clock controller
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
ATPG Methods and Algorithms
ATPG Methods and AlgorithmsATPG Methods and Algorithms
ATPG Methods and Algorithms
 
Codes and Isogenies
Codes and IsogeniesCodes and Isogenies
Codes and Isogenies
 
Combinational & Sequential ATPG.pdf
Combinational & Sequential ATPG.pdfCombinational & Sequential ATPG.pdf
Combinational & Sequential ATPG.pdf
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacks
 
4 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.024 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.02
 
Logic Gate
Logic GateLogic Gate
Logic Gate
 

Recently uploaded

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 

Recently uploaded (20)

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 

Fault Injection Attacks